DocumentCode :
377001
Title :
Cryptographic identification of users over network
Author :
Ikram, Nassar
Author_Institution :
PN Eng. Coll., Nat. Univ. of Sci. & Technol., Karachi, Pakistan
Volume :
1
fYear :
2001
fDate :
2001
Firstpage :
59
Abstract :
In a network, identification of any user is a vital requirement before one is accorded access to the network-shared information bank or database. The database or information may itself either be encrypted or in plain language. There are various techniques, which offer this service through cryptographic techniques as well as through non-cryptographic means, each with its own attributes This paper presents a scheme which uses the identification (ID) based cryptosystem (Shamir, 1984), based on the concept of public key cryptosystem. However, the scheme works on a carefully selected elliptic curve (EC), itself defined on a binary finite field. The finite field so chosen is F2215. The elliptic curve over which the scheme works has been self-generated and those available in the public domain have not been employed. The new scheme offers highly secure underlying cryptosystem and strong challenge-response type of protocol, ensuring complete user trust.
Keywords :
Galois fields; computer networks; message authentication; military communication; protocols; public key cryptography; ID based cryptosystem; binary finite field; challenge-response protocol; cryptographic user identification; elliptic curve; identification based cryptosystem; network based database; public key cryptosystem; Cryptographic protocols; Data engineering; Databases; Elliptic curve cryptography; Elliptic curves; Galois fields; Identity-based encryption; Public key; Public key cryptography; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
Print_ISBN :
0-7803-7225-5
Type :
conf
DOI :
10.1109/MILCOM.2001.985764
Filename :
985764
Link To Document :
بازگشت