Javascript must be enabled to continue!
Identification of Fake Messages Using Two PKCs
View through CrossRef
Abstract
In this paper, two public key cryptosystems are presented and analyzed. The first cryptosystem is an improvement of RSA public key cryptosystem. The second cryptosystem is a novel public key cryptosystem. The encryption/decryption moduli of the introduced new public key scheme is quite different from widely used encryption/decryption moduli by other public key cryptosystems. The introduced new public key cryptosystem based on the exponentiation congruence and use an interesting, computer-friendly modulus:2????. These primitives can be used in protocols for authentication, key exchanges and digital signatures. The introduced two public key cryptosystems are more suitable for highly confidential digital transactions. Both of the cryptosystems are strongly IND secure. The most important thing is, that the both of the public key cryptosystems can identify whether a message is fake or not. The introduced new public key cryptosystem is very collaborative with hash functions such as Whirlpool and SHA-512, because of the modulus 2????.
Title: Identification of Fake Messages Using Two PKCs
Description:
Abstract
In this paper, two public key cryptosystems are presented and analyzed.
The first cryptosystem is an improvement of RSA public key cryptosystem.
The second cryptosystem is a novel public key cryptosystem.
The encryption/decryption moduli of the introduced new public key scheme is quite different from widely used encryption/decryption moduli by other public key cryptosystems.
The introduced new public key cryptosystem based on the exponentiation congruence and use an interesting, computer-friendly modulus:2????.
These primitives can be used in protocols for authentication, key exchanges and digital signatures.
The introduced two public key cryptosystems are more suitable for highly confidential digital transactions.
Both of the cryptosystems are strongly IND secure.
The most important thing is, that the both of the public key cryptosystems can identify whether a message is fake or not.
The introduced new public key cryptosystem is very collaborative with hash functions such as Whirlpool and SHA-512, because of the modulus 2????.
Related Results
DNA-PKcs Suppresses Illegitimate Chromosome Rearrangements
DNA-PKcs Suppresses Illegitimate Chromosome Rearrangements
AbstractTwo DNA repair pathways, non-homologous end joining (NHEJ) and alternative end joining (A-EJ), are involved in V(D)J recombination and chromosome translocation. Previous st...
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Abstract. Shopee is a company engaged in online-based buying and selling services. One of the latest features of Shopee is the ShopeeFood service and has standard rules that must b...
DISCOURSE: KNOWLEDGE, NEWS, AND FAKE INTERTWINED
DISCOURSE: KNOWLEDGE, NEWS, AND FAKE INTERTWINED
Discourse has been a focal point for linguists over an extended period. The multidisciplinary character of the term ‘discourse’ has resulted in diverse approaches aiming to define ...
Metadata analysis of retracted fake papers in Naunyn-Schmiedeberg’s Archives of Pharmacology
Metadata analysis of retracted fake papers in Naunyn-Schmiedeberg’s Archives of Pharmacology
AbstractAn increasing fake paper problem is a cause for concern in the scientific community. These papers look scientific but contain manipulated data or are completely fictitious....
Hold On! Your Emotion and Behaviour when Falling for Fake News in Social Media
Hold On! Your Emotion and Behaviour when Falling for Fake News in Social Media
Researchers are concerned about the impact of fake news on democracy, while it could also escalate to life-threatening problems. Fake news continues to spread, so does people's beh...
Deep Learning for Forgery Face Detection Using Fuzzy Fisher Capsule Dual Graph
Deep Learning for Forgery Face Detection Using Fuzzy Fisher Capsule Dual Graph
In digital manipulation, creating fake images/videos or swapping face images/videos with another person is done by using a deep learning algorithm is termed deep fake. Fake pornogr...
Fake News Detection Using Machine Learning Technique
Fake News Detection Using Machine Learning Technique
People got to know about the world from newspapers to today’s digital media.From 1605 to 2021 the topography of news has evolved at an immense. People forgotten about newspapers an...
Understanding the Strategies of Creating Fake News in Social Media
Understanding the Strategies of Creating Fake News in Social Media
Social media giants like Facebook are struggling to keep up with fake news, in the light of the fact that disinformation diffuses at lightning speed. For example, the COVID-19 (i.e...

