Abstract
In this paper, a new public key cryptosystem based on hash is proposed. The algorithm uses hash and time-memory trade-off to construct a trap-door one-way function. It can guarantee the security strength equivalent to the same length symmetric encryption algorithm. Meanwhile, our algorithm has a fast encryption speed and reasonable decryption time, which can be applied to message encryption on the occasions of limited resources such as wireless sensor network. Experimental and theoretical analysis proves that under the same encryption strength, our algorithm’s packet length can be much lower than traditional encryption schemes such as RSA, and has an excellent performance in encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Garg, S., Gentry, C., Halevi, S., et al.: Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5), 113–120 (2016)
Nagaraj, S., Raju, G., Srinadth, V.: Data encryption and authetication using public key approach. Procedia Comput. Sci. 48, 126–132 (2015)
Sasdrich, P., Güneysu, T.: Efficient elliptic-curve cryptography using Curve25519 on reconfigurable devices. In: Goehringer, D., Santambrogio, M.D., Cardoso, J.M.P., Bertels, K. (eds.) ARC 2014. LNCS, vol. 8405, pp. 25–36. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-05960-0_3
Miri, J., Nsiri, B., Bouallegue, R.: Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem. In: 2017 Sixth International Conference on Communications and Networking, Hammamet, pp. 1–7 (2017)
Junli, F., Yawen, W., Haibin, S.: An improved energy-efficient routing algorithm in software define wireless sensor network. In: 2017 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1–5. IEEE (2017)
Suryadevara, N.K., Mukhopadhyay, S.C., Kelly, S.D.T.: WSN-based smart sensors and actuator for power management in intelligent buildings. IEEE Trans. Mechatron. 20(2), 564–571 (2015)
Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory 26(4), 401–406 (1980)
Lu, H., Zhu, X., Gan, Z.: A blocked rainbow table time-memory trade-off method. In: 12th Web Information System and Application Conference, Jinan, pp. 324–329 (2015)
Tian, Y., Gu, D., Gu, H., Ding, N.: Improved cryptanalytic of time-memory trade-off based on rainbow table. In: ICINS 2014, 2014 International Conference on Information and Network Security, Beijing, pp. 97–104 (2014)
Hong, J., Moon, S.: A comparison of cryptanalytic tradeoff algorithms. J. Cryptol. 26(4), 559–637 (2013)
Gupta, P., Kumar, S.: A comparative analysis of SHA and MD5 algorithm. Architecture 1, 5 (2014)
Shah, D.: Digital security using cryptographic message digest algorithm. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 3(10) (2015)
Lu, Y., Zhai, J., Zhu, R., et al.: Study of wireless authentication center with mixed encryption in WSN. J. Sens. 2016 (2016)
Lee, G.W., Hong, J.: Comparison of perfect table cryptanalytic tradeoff algorithms. Des. Codes Cryptogr. 80(3), 473–523 (2016)
Date, W., Note, W.: Archived NIST Technical Series Publication. NIST Special Publication 800-26 (1992)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Yin, Q., Luo, G. (2018). A Hash-Based Public Key Cryptosystem. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)