DocumentCode :
3580585
Title :
A Cryptographic Approach Based on Integrating Running Key in Feedback Mode of ElGamal System
Author :
Nalwaya, Priya ; Saxena, Varun P. ; Nalwaya, Pulkit
Author_Institution :
Gov. Woman Eng. Coll., Ajmer, India
fYear :
2014
Firstpage :
719
Lastpage :
724
Abstract :
In this ElGamal Digital Signature schema, security is very challenging and with time it is becoming a serious problem, hence the modifications for this algorithm have been proposed. This paper produce more efficient and effective schema of El Gamal algorithm. This work pertains to a rigid blended process of cryptographic application based upon ordered use of both private key cryptography and public key cryptography by using single public-private key pair. We construct a cryptographic schema by using running key cipher and El Gamal algorithm. In this work we used an approach of symmetric cipher feedback into an asymmetric cryptography schema rather than simple message feedback mode. Main issue with message feedback approach which arrives is that it does not consider the frequency of English alphabet which may be used for cryptanalysis. Further, more of the application relies over x-or of the message block in feedback mode, which seems impractical in the current scenario. For symmetric encryption, we used a running key cipher and for asymmetric module, we used El Gamal in feedback mode. In this schema by using single step of El Gamal we provide security to the entire message block involved, and further we switch to light weight process so the degree of security is maintained and performance is achieved.
Keywords :
digital signatures; private key cryptography; public key cryptography; ElGamal digital signature schema; ElGamal system; English alphabet; asymmetric cryptography schema; feedback mode; private key cryptography; public key cryptography; running key; security; symmetric cipher feedback; Algorithm design and analysis; Ciphers; Encryption; Public key; Receivers; Cipher Feedback; El Gamal Cipher; One Time Pad; Random Functions and Random Numbers; Running Key Cipher;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Communication Networks (CICN), 2014 International Conference on
Print_ISBN :
978-1-4799-6928-9
Type :
conf
DOI :
10.1109/CICN.2014.157
Filename :
7065577
Link To Document :
بازگشت