An encryption - authentication algorithms developed from the elgamal cryptosystem
222 viewsDOI:
https://doi.org/10.54939/1859-1043.j.mst.CSCE5.2021.61-70Keywords:
Public - Key Cryptography Algorithm; Algorithm cryptographic; Algorithm ciphers ElGamal; Algorithm signcription DSA.Abstract
The paper proposes encryption - authentication algorithms developed from the Elgamal cryptosystem. There are algorithms included: system parameters, keys, encryption, and authenticated decryption. New proposed algorithms ensure a level of security against attacks: revealing secret keys - compared with RSA, GOST; security - compare with ElGamal; anti-forgery. Simultaneously verify the origin of e-doc and ensure the sender's authentication.
References
[1]. National Institute of Standards and Technology, FIPS PUB 186-4, July 2013.
[2]. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar2.pdf.
[3]. Mark Stamp, Richard M. Low. “Applicd cryptanalysis: Breaking Ciphers in the Real World”. John Wiley & Sons, Inc., ISBN 978-0-470-1.
[4]. GOST R 34.10-94, Russian Federation Standard Information Technology. “Cryptographic Data Security, Produce and Check Procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm”, Government Committee of the Russia for Standards, 1994 (in Russian).
[5]. “Cryptography and Network Security: Principles and Practice”, 7th Edition, ISBN 978-0-13-444428-4, by William Stallings 2017.
[6]. Nguyễn Lương Bình, Lưu Hồng Dũng, Tống Minh Ðức (8-2018), “Một phương pháp phát triển hệ mật khóa công khai”, Kỷ yếu Hội nghị KHCN Quốc gia lần thứ XI về Nghiên cứu cơ bản và ứng dụng Công nghệ thông tin (FAIR), Hà Nội, ngày 09-10/8/2018. DOI: 10.15625/vap.2018.00042 (in Vietnamese).