Implementation, Comparison, and Enhancement of Secure Communication Designs

Abstract Cryptography offers effective techniques to ensure users’ security and privacy in an efficient way. To protect networks from intruders/attackers and transmit a message over an insecure channel, encryption and digital signature algorithms could be used within different designs to provide secure networks and security solutions in order to protect users’ information and their data from being attacked. These designs would ensure confidentiality, authenticity, integrity, and non-repudiation. Signcryption algorithms achieve the properties of both digital signature and encryption schemes. In this paper, we implement the Schnorr Signcryption and RSA Encrypt-Sign-Encrypt (Sign-Encrypt-Sign) schemes. Moreover, we will illustrate the comparison between the RSA Encrypt-Sign-Encrypt and Schnorr Signcryption schemes in terms of computation cost. Additionally, we will present an improvement factor in the case of parallelisation techniques applied to Schnorr Signcryption and RSA Encrypt-Sign-Encrypt (Sign-Encrypt-Sign) schemes.

[1]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[2]  Yuh-Min Tseng,et al.  A Revocable ID-based Signcryption Scheme , 2012, J. Inf. Hiding Multim. Signal Process..

[3]  Anne Marsden,et al.  International Organization for Standardization , 2014 .

[4]  Heba Kamal Aslan,et al.  On the security of two improved authenticated encryption schemes , 2013, Int. J. Secur. Networks.

[5]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[6]  Ghada F. El Kabbany,et al.  An Efficient Pipelined Technique for Signcryption Algorithms , 2014 .

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..

[9]  Rajeev Gupta,et al.  Performance Evaluation of Modified Signcryption Scheme , 2012 .

[10]  Daniel R. L. Brown Deniable Authentication with RSA and Multicasting , 2005, IACR Cryptol. ePrint Arch..

[11]  Laura Savu,et al.  Combining Public Key Encryption with Schnorr Digital Signature , 2012 .

[12]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[13]  Alexis B. Carter,et al.  Privacy and security of patient data in the pathology laboratory , 2013, Journal of pathology informatics.

[14]  Ross J. Anderson,et al.  Robustness Principles for Public Key Protocols , 1995, CRYPTO.