Academia.eduAcademia.edu

Outline

Public Key Cryptology – An Art of Keeping Secrecy and Authenticity

Abstract

Cryptology consists of several mechanisms which ensure confidentiality and authenticity of the data. The fundamental objective of cryptology is the secure communication between sender and receiver through insecure channel. Modern cryptosystems can be broadly categorized in to secret key (symmetric) and public key (asymmetric) cryptosystems based up on the key which is used for data transmission. This paper focuses on the discussion of different categories of public key cryptosystems with its merits and demerits.

Key takeaways
sparkles

AI

  1. Public key cryptosystems ensure secure communication without prior key sharing, enhancing confidentiality and authenticity.
  2. Modern cryptosystems are categorized into symmetric and asymmetric based on key usage for data transmission.
  3. Public Key Infrastructure (PKI) requires a certifying authority for public key authentication, introducing management overhead.
  4. Identity-based cryptosystems streamline key management by using user identities as public keys but face key escrow issues.
  5. Certificate-less cryptosystems mitigate PKI and identity-based drawbacks, avoiding overhead and key escrow risks.

References (12)

  1. Menezes, A. J., S. A. Vanstone, and P. C. V. Oorschot, "Handbook of applied cryptography", CRC Press, Inc., Boca Raton, FL, USA, 1996, 1st edition.,ISBN 0849385237, 87-132.
  2. Stinson, D., "Cryptography: Theory and Practice", Third Edition,Taylor & Francis, 2005. ISBN 9781584885085, 119-139. URL http://books.google.co.in/books?id=uhl_kYfpgo4C
  3. Goldwasser, S. and S. Micali, "Probabilistic encryption", Journal of Computer System Sciences, 28(2), 270-299, 1984. ISSN 0022-0000.URL http://www.sciencedirect.com/science/article/pii/00220000 84 900709.\
  4. Shannon, C., "Communication theory of secrecy systems", Bell System Technical Journal, 28, 656-715. URL http://www.bibsonomy. org/bibtex/2b07c0c91f6c750562d884d919065a6e8/nmenke.
  5. Stallings, W., "Cryptography and network security: Principles and practice", Pearson Education, 2002, 3rd edition. ISBN 0130914290, 26-31.
  6. Diffie,W. and M. E. Hellman, "New directions in cryptography", In IEEE Transactions on Information Theory, volume 22. IEEE Press, Piscataway, NJ, USA, 1976, 644-654. URL http://dx.doi.org/10.1109 / TIT. 1976.1055638.
  7. Rivest, R. L., A. Shamir, and L.M.Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", volume 21, ACM, New York, NY, USA, 1978, 120-126. URL http://doi.acm.org/10.1145/359340.359342.
  8. Vacca, J., "Public Key Infrastructure: Building Trusted Applications and Web Services", Information security books. Auerbach Publications/CRC Press LLC, 2004. ISBN 9780849308222, 8-9. URL http://books.google. com.ng /books?id=tlbzmAEACAAJ.
  9. Shamir, A., "Identity-based cryptosystems and signature schemes", In Proceedings of CRYPTO'84 on Advances in Cryptology. Springer-Verlag New York, Inc., New York, NY, USA, 1985. ISBN 0-387-15658-5, 47-53. URL http://dl.acm.org/citation.cfm?id=19478.19483.
  10. Boneh, D. and M. K. Franklin, "Identity-Based Encryption from the Weil Pairing (Extended Abstract)", In J. Kilian (ed.), CRYPTO, volume 2139 of Lecture Notes in Computer Science. Springer, 2001. ISBN 3-540-42456-3, 213-229.
  11. Cocks, C., "An Identity Based Encryption Scheme Based on Quadratic Residues", In B. Honary (ed.), IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science. Springer, 2001. ISBN 3-540-43026-1, 360-363.
  12. Al-Riyami, S. S. and K. G. Paterson, Certificateless Public Key Cryptography. In C.-S. Laih (ed.), ASIACRYPT, volume 2894 of Lecture Notes in Computer Science. Springer, 2003. ISBN 3-540-20592-6, 452-473.