Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Identification of Fake Messages Using Two PKCs

View through CrossRef
Abstract In this paper, two public key cryptosystems are presented and analyzed. The first cryptosystem is an improvement of RSA public key cryptosystem. The second cryptosystem is a novel public key cryptosystem. The encryption/decryption moduli of the introduced new public key scheme is quite different from widely used encryption/decryption moduli by other public key cryptosystems. The introduced new public key cryptosystem based on the exponentiation congruence and use an interesting, computer-friendly modulus:2????. These primitives can be used in protocols for authentication, key exchanges and digital signatures. The introduced two public key cryptosystems are more suitable for highly confidential digital transactions. Both of the cryptosystems are strongly IND secure. The most important thing is, that the both of the public key cryptosystems can identify whether a message is fake or not. The introduced new public key cryptosystem is very collaborative with hash functions such as Whirlpool and SHA-512, because of the modulus 2????.
Springer Science and Business Media LLC
Title: Identification of Fake Messages Using Two PKCs
Description:
Abstract In this paper, two public key cryptosystems are presented and analyzed.
The first cryptosystem is an improvement of RSA public key cryptosystem.
The second cryptosystem is a novel public key cryptosystem.
The encryption/decryption moduli of the introduced new public key scheme is quite different from widely used encryption/decryption moduli by other public key cryptosystems.
The introduced new public key cryptosystem based on the exponentiation congruence and use an interesting, computer-friendly modulus:2????.
These primitives can be used in protocols for authentication, key exchanges and digital signatures.
The introduced two public key cryptosystems are more suitable for highly confidential digital transactions.
Both of the cryptosystems are strongly IND secure.
The most important thing is, that the both of the public key cryptosystems can identify whether a message is fake or not.
The introduced new public key cryptosystem is very collaborative with hash functions such as Whirlpool and SHA-512, because of the modulus 2????.

Related Results

DNA-PKcs Suppresses Illegitimate Chromosome Rearrangements
DNA-PKcs Suppresses Illegitimate Chromosome Rearrangements
AbstractTwo DNA repair pathways, non-homologous end joining (NHEJ) and alternative end joining (A-EJ), are involved in V(D)J recombination and chromosome translocation. Previous st...
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Abstract. Shopee is a company engaged in online-based buying and selling services. One of the latest features of Shopee is the ShopeeFood service and has standard rules that must b...
DISCOURSE: KNOWLEDGE, NEWS, AND FAKE INTERTWINED
DISCOURSE: KNOWLEDGE, NEWS, AND FAKE INTERTWINED
Discourse has been a focal point for linguists over an extended period. The multidisciplinary character of the term ‘discourse’ has resulted in diverse approaches aiming to define ...
Effects of Intervention Timing on Health-Related Fake News: Simulation Study
Effects of Intervention Timing on Health-Related Fake News: Simulation Study
Background Fake health-related news has spread rapidly through the internet, causing harm to individuals and society. Despite interventions, a fenbendazole scan...
Effects of Intervention Timing on Health-Related Fake News: Simulation Study (Preprint)
Effects of Intervention Timing on Health-Related Fake News: Simulation Study (Preprint)
BACKGROUND Fake health-related news has spread rapidly through the internet, causing harm to individuals and society. Despite interventions, a fenbendazole ...
An Empirical Study on Fake News Menace and Misinformation with Special Reference to India
An Empirical Study on Fake News Menace and Misinformation with Special Reference to India
Fake news are the news, cooked up stories or hoaxes that are created to deliberately misinform or deceive the consumers/readers. Usually, these stories are created to either influe...
DNA-PKcs restricts Zika virus spreading and is required for effective antiviral response
DNA-PKcs restricts Zika virus spreading and is required for effective antiviral response
Zika virus (ZIKV) is a single-strand RNA mosquito-borne flavivirus with significant public health impact. ZIKV infection induces double-strand DNA breaks (DSBs) in human neural pro...
Metadata analysis of retracted fake papers in Naunyn-Schmiedeberg’s Archives of Pharmacology
Metadata analysis of retracted fake papers in Naunyn-Schmiedeberg’s Archives of Pharmacology
AbstractAn increasing fake paper problem is a cause for concern in the scientific community. These papers look scientific but contain manipulated data or are completely fictitious....

Back to Top