Modification of ElGamal Cryptosystem into Data Encryption and Signature Generation

Author(s):  
Prerna Mohit ◽  
G. P. Biswas
2019 ◽  
Vol 32 (1) ◽  
pp. 129-145 ◽  
Author(s):  
Kamalakannan Venkataraman ◽  
Tamilselvan Sadasivam

With rapid deployment of Internet-of-Things (IoT) devices, security issues related to data transmitted between the devices increases. Thus the integrity of perceptual layer devices is of utmost importance to secure the information being transmitted between the devices. In a secured information system, digital signature generation and verification processes are entirely different from data encryption and decryption processes. Digital signatures are rapidly emerging due to the problems related to data integrity thus playing a crucial role in the authentication process by enabling the sender to attach a signature to the encrypted message. Based on the devices it is beneficial to select an algorithm showing favorable behavior, therefore Keccak-f [1600] algorithm is best suited for devices having area and cost constraints. In this paper, implementation of the original Elliptic Curve Digital Signature Algorithm and its variants are considered and evaluated in terms of the security level and computational cost. Here the modified ECDSA scheme concepts related to signature generation and verification are similar to the original ECDSA scheme. The computational cost of the Modified ECDSA is reduced by removing inverse operation in key generation and signing phase, also problems related to signature being forged are resolved using hidden generator point concept. Hence the Modified ECDSA is more secure with less computational cost when implemented on FPGA using Verilog HDL. Therefore, this algorithm can be applied for the devices being connected in perceptual layer of the IoT.


2010 ◽  
Vol 20-23 ◽  
pp. 546-552 ◽  
Author(s):  
Xuan Wu Zhou

As a typical fast public key cryptosystem, HCC (Hyper-elliptic Curves Cryptosystem) provides efficient asymmetric algorithms for cryptography schemes. In the paper, we presented an improved authenticated encryption scheme based on HCC as a prototype of signcryption scheme. In the scheme, data encryption and signature generation can be achieved in a single formula and signature verifying protocol is also the decryption algorithm. Therefore, the scheme achieves secret message transmission and authentication simultaneously in one protocol. The scheme renders effective secrecy protection for message receiver; the attack on the authenticated signature and random parameters via the cipher-text is computationally infeasible. The designing strategy of message recovery signature reinforces the security and reliability of authenticated encryption and greatly improves its efficiency for software and hardware application. As a generalization of the authenticated encryption scheme, we presented a signcryption scheme based on HCC. The scheme makes full use of the superiority of fast asymmetric cryptosystem and effectively improves the application efficiency of signcryption for integrated environment.


2020 ◽  
Vol 14 ◽  
Author(s):  
Khoirom Motilal Singh ◽  
Laiphrakpam Dolendro Singh ◽  
Themrichon Tuithung

Background: Data which are in the form of text, audio, image and video are used everywhere in our modern scientific world. These data are stored in physical storage, cloud storage and other storage devices. Some of it are very sensitive and requires efficient security while storing as well as in transmitting from the sender to the receiver. Objective: With the increase in data transfer operation, enough space is also required to store these data. Many researchers have been working to develop different encryption schemes, yet there exist many limitations in their works. There is always a need for encryption schemes with smaller cipher data, faster execution time and low computation cost. Methods: A text encryption based on Huffman coding and ElGamal cryptosystem is proposed. Initially, the text data is converted to its corresponding binary bits using Huffman coding. Next, the binary bits are grouped and again converted into large integer values which will be used as the input for the ElGamal cryptosystem. Results: Encryption and Decryption are successfully performed where the data size is reduced using Huffman coding and advance security with the smaller key size is provided by the ElGamal cryptosystem. Conclusion: Simulation results and performance analysis specifies that our encryption algorithm is better than the existing algorithms under consideration.


Sign in / Sign up

Export Citation Format

Share Document