Title :
New Cryptographic Primitives
Author :
Knapskog, Svein Johan
Author_Institution :
Center of Excellence for Quantifiable Quality of Service, Norwegian Univ. of Sci. & Technol., Trondheim
Abstract :
New communications paradigms such as wireless communications for handheld devices have increased requirements for operating speed of relevant security mechanisms, such as encryption for confidentiality, hashing for message integrity and combined hashing and public key encryption for digital signature. Existing secure services have traditionally been implemented by employing hybrid cryptographic protocols, i.e. combinations of symmetric and asymmetric (public key) algorithms to handle both effective key management and cryptographic performance. These solutions are in increasing degree becoming obsolete by the trend to connect end users with terminals with limited storage and processing power via wireless networks, sometimes established in a totally ad hoc fashion, with little or no centralized management to organize user authorization for access to secured services. New, lightweight protocols are in increasing demand, and the cryptographic primitives necessary for implementation of such protocols also need to be adapted to these new user scenarios.At NTNU/Q2S, research in this area has been ongoing for a period of time resulting in a number of new solutions adapted to the new paradigm encompassing mobile users of distributed communication services. In this talk, some of the general features of the new cryptographic primitives will be described. The designs are mainly based on new insight into the characteristics of quasigroups and quasi group string operations.
Keywords :
cryptographic protocols; public key cryptography; ad hoc fashion; confidentiality encryption; cryptographic primitives; digital signature; distributed communication services; handheld devices; hybrid cryptographic protocols; key management; message integrity; mobile users; public key encryption; quasigroup string operations; wireless communications; Access protocols; Cryptographic protocols; Digital signatures; Handheld computers; Public key; Public key cryptography; Secure storage; Security; Wireless communication; Wireless networks; Cryptography; Quasigroups; asymmetric algoithms; cryptcoding; hash functions; symmetric algorithms;
Conference_Titel :
Computer Information Systems and Industrial Management Applications, 2008. CISIM '08. 7th
Conference_Location :
Ostrava
Print_ISBN :
978-0-7695-3184-7
DOI :
10.1109/CISIM.2008.64