Asymmetric Algorithm - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Asymmetric Algorithm

The Experts below are selected from a list of 264 Experts worldwide ranked by ideXlab platform

Xiang Peng – 1st expert on this subject based on the ideXlab platform

  • Generalized amplitude-phase retrieval Algorithm attack on ‘double images encryption method with resistance against the special attack based on an Asymmetric Algorithm
    Proceedings of SPIE, 2016
    Co-Authors: Chenggong Zhang, Wenqi He, Xiang Peng

    Abstract:

    A generalized amplitude-phase retrieval Algorithm (GAPRA) attack on ‘double images encryption method with resistance against the special attack based on an Asymmetric Algorithm’ (DIEM) is presented in this paper. The analysis shows that the DIEM is a cascaded cryptosystem, which consist of a joint transform correlator architecture and a phasetruncated Fourier transform scheme. A GAPRA attack is proposed and the potential risk of the cascaded cryptosystems is discussed. By using our method, an attacker could crack high-quality results of the plaintexts. A set of simulation results demonstrate the validity and feasibility of the proposed method.

  • Information security system based on virtual-optics imaging methodology and public key infrastructure
    Optik, 2005
    Co-Authors: Xiang Peng, Peng Zhang

    Abstract:

    Summary In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption Algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an Asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  • Virtual-optical information security system based on public key infrastructure
    Information Optics and Photonics Technology, 2005
    Co-Authors: Xiang Peng, Peng Zhang

    Abstract:

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

Peng Zhang – 2nd expert on this subject based on the ideXlab platform

  • Information security system based on virtual-optics imaging methodology and public key infrastructure
    Optik, 2005
    Co-Authors: Xiang Peng, Peng Zhang

    Abstract:

    Summary In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption Algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an Asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  • Virtual-optical information security system based on public key infrastructure
    Information Optics and Photonics Technology, 2005
    Co-Authors: Xiang Peng, Peng Zhang

    Abstract:

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an Asymmetric Algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

John Hamilton – 3rd expert on this subject based on the ideXlab platform

  • An elliptical cryptographic Algorithm for rf wireless devices
    2007 Winter Simulation Conference, 2007
    Co-Authors: Robert Steven Owor, Khalil Dajani, Zephyrinus Okonkwo, John Hamilton

    Abstract:

    In this paper, we propose a new Asymmetric cryptographic Algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The Algorithm describes how an orthogonal frequency division multiplexing (OFDM) based RF wireless system can be encrypted using planner matrix Elliptical Curve Cryptography (ECC). The newly described Asymmetric Algorithm can be applied to the OFDM transmission scheme in the design of more robust and secure cryptography in portable wireless devices. An analysis of the proposed Algorithm is made using the discrete logarithm approach. Two methods, namely, Pollard’s rho Attack and Index Calculus are investigated with respect to the new Algorithm. We found that our method makes it even more difficult to break the ECC encryption.