Skip to main content

A Hash-Based Public Key Cryptosystem

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

  • 2252 Accesses

Abstract

In this paper, a new public key cryptosystem based on hash is proposed. The algorithm uses hash and time-memory trade-off to construct a trap-door one-way function. It can guarantee the security strength equivalent to the same length symmetric encryption algorithm. Meanwhile, our algorithm has a fast encryption speed and reasonable decryption time, which can be applied to message encryption on the occasions of limited resources such as wireless sensor network. Experimental and theoretical analysis proves that under the same encryption strength, our algorithm’s packet length can be much lower than traditional encryption schemes such as RSA, and has an excellent performance in encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Garg, S., Gentry, C., Halevi, S., et al.: Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5), 113–120 (2016)

    Article  Google Scholar 

  2. Nagaraj, S., Raju, G., Srinadth, V.: Data encryption and authetication using public key approach. Procedia Comput. Sci. 48, 126–132 (2015)

    Article  Google Scholar 

  3. Sasdrich, P., Güneysu, T.: Efficient elliptic-curve cryptography using Curve25519 on reconfigurable devices. In: Goehringer, D., Santambrogio, M.D., Cardoso, J.M.P., Bertels, K. (eds.) ARC 2014. LNCS, vol. 8405, pp. 25–36. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-05960-0_3

    Chapter  Google Scholar 

  4. Miri, J., Nsiri, B., Bouallegue, R.: Privacy group distance bounding protocol on TH-UWB based NTRU public key cryptosystem. In: 2017 Sixth International Conference on Communications and Networking, Hammamet, pp. 1–7 (2017)

    Google Scholar 

  5. Junli, F., Yawen, W., Haibin, S.: An improved energy-efficient routing algorithm in software define wireless sensor network. In: 2017 IEEE International Conference on Signal Processing, Communications and Computing, pp. 1–5. IEEE (2017)

    Google Scholar 

  6. Suryadevara, N.K., Mukhopadhyay, S.C., Kelly, S.D.T.: WSN-based smart sensors and actuator for power management in intelligent buildings. IEEE Trans. Mechatron. 20(2), 564–571 (2015)

    Article  Google Scholar 

  7. Hellman, M.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory 26(4), 401–406 (1980)

    Article  MathSciNet  Google Scholar 

  8. Lu, H., Zhu, X., Gan, Z.: A blocked rainbow table time-memory trade-off method. In: 12th Web Information System and Application Conference, Jinan, pp. 324–329 (2015)

    Google Scholar 

  9. Tian, Y., Gu, D., Gu, H., Ding, N.: Improved cryptanalytic of time-memory trade-off based on rainbow table. In: ICINS 2014, 2014 International Conference on Information and Network Security, Beijing, pp. 97–104 (2014)

    Google Scholar 

  10. Hong, J., Moon, S.: A comparison of cryptanalytic tradeoff algorithms. J. Cryptol. 26(4), 559–637 (2013)

    Article  MathSciNet  Google Scholar 

  11. Gupta, P., Kumar, S.: A comparative analysis of SHA and MD5 algorithm. Architecture 1, 5 (2014)

    Google Scholar 

  12. Shah, D.: Digital security using cryptographic message digest algorithm. Int. J. Adv. Res. Comput. Sci. Manag. Stud. 3(10) (2015)

    Google Scholar 

  13. Lu, Y., Zhai, J., Zhu, R., et al.: Study of wireless authentication center with mixed encryption in WSN. J. Sens. 2016 (2016)

    Google Scholar 

  14. Lee, G.W., Hong, J.: Comparison of perfect table cryptanalytic tradeoff algorithms. Des. Codes Cryptogr. 80(3), 473–523 (2016)

    Article  MathSciNet  Google Scholar 

  15. Date, W., Note, W.: Archived NIST Technical Series Publication. NIST Special Publication 800-26 (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Qian Yin or Gang Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yin, Q., Luo, G. (2018). A Hash-Based Public Key Cryptosystem. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics