asymmetric cryptosystem
Recently Published Documents


TOTAL DOCUMENTS

73
(FIVE YEARS 20)

H-INDEX

17
(FIVE YEARS 3)

2021 ◽  
Author(s):  
Xiangyu Chang ◽  
Wei Li ◽  
Aimin Yan ◽  
Peter Wai Ming Tsang ◽  
Ting-Chung Poon

Abstract We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ECC algorithm from sender’s biometric image, which is sender’s private key. With the ECC algorithm, these holograms are encrypted to ciphertext, which is sent to the receiver. In the stage of decryption, the ciphered holograms can be decrypted by receiver’s biometric private key which is different from the sender’s private key. The approach is an asymmetric cryptosystem which solves the problem of the management and dispatch of keys in OSC and has more security strength than it. The feasibility of the proposed method has been convincingly verified by numerical and experiment results.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hang Chen ◽  
Zhengjun Liu ◽  
Camel Tanougast ◽  
Walter Blondel

AbstractAn asymmetric cryptosystem is presented for encrypting multiple images in gyrator transform domains. In the encryption approach, the devil’s spiral Fresnel lens variable pure phase mask is first designed for each image band to be encrypted by using devil’ mask, random spiral phase and Fresnel mask, respectively. Subsequently, a novel random devil’ spiral Fresnel transform in optical gyrator transform is implemented to achieved the intermediate output. Then, the intermediate data is divided into two masks by employing random modulus decomposition in the asymmetric process. Finally, a random permutation matrix is utilized to obtain the ciphertext of the intact algorithm. For the decryption approach, two divided masks (private key and ciphertext) need to be imported into the optical gyrator input plane simultaneously. Some numerical experiments are given to verify the effectiveness and capability of this asymmetric cryptosystem.


2021 ◽  
Vol 58 (1) ◽  
pp. 1496-1500
Author(s):  
Kiattikul Sooksomsatarn Et al.

Nowadays, Blockchain is a disruptive technology, particularly in the financial context. Moreover, Blockchain is behind the success of cryptocurrencies, e.g., Bitcoin and Ethereum. Unlike traditional currencies, cryptocurrencies are entirely virtual. There is no physical money, but it can directly make payments in digital currency from one person to another without intermediaries. Moreover, Hashing's cryptographic algorithm makes Blockchain resist tampering from any transacting participants because the submitted block cannot be altered or re-engineered. However, another big problem is how users of cryptocurrencies stop somebody from adding or editing a transaction that spends someone else's money to them. To do this, Blockchain needs another cryptosystem called Public/Private Keys, a primitive asymmetric cryptosystem, e.g., the RSA encryption, to sign the transactions for proving the authenticity of the ownership without revealing the signed secret information. The generated public key is regarded as a ledger account number or digital wallet of the sender and the recipient. Simultaneously, the paired private keys are used to identify whether the digital wallets' owners are authentic. As growing network entities and propagated Blockchain transactions, computing millions of replicated tokens in the blocks to sign and verify the digital wallet's ownership is computationally expensive. However, a certain of chosen arithmetical transformations that can simplify mathematical cost can significantly reduce computational complexity. This research's main contribution is developing a protocol that can reduce the complexity and mathematical cost in generating the digital wallet and verifying its authenticity of ownership. Finally, performance analyses of the RSA algorithm for the protocol have been measured and visualized using Python.


2021 ◽  
Vol 70 (14) ◽  
pp. 144202-144202
Author(s):  
Xu Zhao ◽  
◽  
Zhou Xin ◽  
Bai Xing ◽  
Li Cong ◽  
...  

Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 45
Author(s):  
Muzna Yumman ◽  
Tariq Shah ◽  
Iqtadar Hussain

The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. In this respect, novel asymmetric cryptosystems based on matrices over residue rings are in practice. In this article, a novel approach is introduced. [...]


2020 ◽  
Vol 14 (4) ◽  
pp. 169-175 ◽  
Author(s):  
Changtao He ◽  
Zhigang Liu ◽  
Xudong Chen ◽  
Jun Wang

Author(s):  
Shivani Yadav ◽  
Hukum Singh

Background: An asymmetric cryptosystem using Structured Phase Mask (SPM) and Random Phase Mask (RPM) in fractional Fourier transform (FrFT) using lower-Upper decomposition with partial pivoting is proposed to provide extra security to the system. The usage of structured phase mask offers additional parameter in encryption. In the encoded process the phase-truncation (PT) part is replaced by the LUDP that is by the decomposition part. Objective: Introducing an asymmetric cryptosystem with LUDP is to avert quick identification of encrypted image in the FrFT domain. Method: Input image is firstly convoluted with SPM, in FrFT and in LUDP then the obtained result is convoluted with RPM in inverse FrFT and in LUDP. Finally, the encoded image is attained. Results: The strength and legitimacy of the proposed scheme have been verified by using numerical analysis on MATLAB R2018a (9.4.0.813654). For checking the viability of the proposed scheme mathematical simulations have been carried out which determines the performance and better quality of an image based on key sensitivity, occlusion attack, noise attacks and histograms. Conclusion: A novel asymmetric cryptosystem is proposed using two phase masks one is SPM and another is RPM. LUDP is proposed in which the encoded procedure is different from the decoded procedure. Security is enhanced by increasing the number of keys and the scheme is also robust against attacks. Statistical simulations are also carried out for inspection the strength and viability of the algorithm.


2020 ◽  
Vol 129 ◽  
pp. 106063 ◽  
Author(s):  
Mohamed Abdelfattah ◽  
Salem F. Hegazy ◽  
Nihal F.F. Areed ◽  
Salah S.A. Obayya

Sign in / Sign up

Export Citation Format

Share Document