用椭圆曲线密码学实现blom的密钥预分配方案

Nizam Udin, F. A. M. Amin, A. Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, Siti Aisyah Mohd Ridzuwan
{"title":"用椭圆曲线密码学实现blom的密钥预分配方案","authors":"Nizam Udin, F. A. M. Amin, A. Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, Siti Aisyah Mohd Ridzuwan","doi":"10.24191/mjoc.v6i2.11508","DOIUrl":null,"url":null,"abstract":"Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.  Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.","PeriodicalId":129482,"journal":{"name":"MALAYSIAN JOURNAL OF COMPUTING","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY\",\"authors\":\"Nizam Udin, F. A. M. Amin, A. Malek, Nur Annisa Zulkifili, Nur Atiqah Ghazali, Siti Aisyah Mohd Ridzuwan\",\"doi\":\"10.24191/mjoc.v6i2.11508\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.  Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.\",\"PeriodicalId\":129482,\"journal\":{\"name\":\"MALAYSIAN JOURNAL OF COMPUTING\",\"volume\":\"2012 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MALAYSIAN JOURNAL OF COMPUTING\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24191/mjoc.v6i2.11508\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MALAYSIAN JOURNAL OF COMPUTING","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24191/mjoc.v6i2.11508","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

密码学及其各种方法被用来服务于安全通信的目的。如果加密密钥难以被攻击者破解,那么加密技术就是安全的。最初,Blom的密钥预分发使用整数有限域,这使得该方案易于被攻击者和犯罪分子干预。因此,本研究建议实现椭圆曲线加密,以更好地提高原有Blom密码的安全性。在该方案中,由椭圆曲线生成的点将被指定为公共标识符,并在原方案中使用。每个用户的私钥和会话密钥使用加法数学运算生成,并分配公共标识符。打算相互通信的两个用户将获得一个公共会话密钥。总体而言,本研究将提出对Blom密钥预分配方案的修改。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.  Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信