Implementation, Comparison, and Enhancement of Secure Communication Designs
Author(s) -
Aya Elshobaky,
Ghada F. Elkabbany,
Mohamed Rasslan,
Shawkat Gurguis
Publication year - 2014
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2014.08.054
Subject(s) - signcryption , computer science , encryption , digital signature , cryptography , sign (mathematics) , computer security , signature (topology) , computer network , public key cryptography , mathematics , hash function , mathematical analysis , geometry
Cryptography offers effective techniques to ensure users’ security and privacy in an efficient way. To protect networks from intruders/attackers and transmit a message over an insecure channel, encryption and digital signature algorithms could be used within different designs to provide secure networks and security solutions in order to protect users’ information and their data from being attacked. These designs would ensure confidentiality, authenticity, integrity, and non-repudiation. Signcryption algorithms achieve the properties of both digital signature and encryption schemes. In this paper, we implement the Schnorr Signcryption and RSA Encrypt-Sign-Encrypt (Sign-Encrypt-Sign) schemes. Moreover, we will illustrate the comparison between the RSA Encrypt-Sign-Encrypt and Schnorr Signcryption schemes in terms of computation cost. Additionally, we will present an improvement factor in the case of parallelisation techniques applied to Schnorr Signcryption and RSA Encrypt-Sign-Encrypt (Sign-Encrypt-Sign) schemes
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom