A method for constructing public-key block cipher schemes based on elliptic curves

174 views

Authors

DOI:

https://doi.org/10.54939/1859-1043.j.mst.CSCE6.2022.114-121

Keywords:

Symmetric key cryptography; Public key cryptography; Block cipher; Encryption – Authentication schemes; Discrete logarithm problem on elliptic curves.

Abstract

The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message. In addition, a shared secret key is established between the sender/encryptor and the receiver/decryptor for each encrypted message based on public key cryptography which also improves the security of these cipher schemes.

References

[1]. Luu Hong Dung, Nguyen Anh Viet. "A solution to build a symmetric-key cryptosystem". Information Security Magazine, Issue 5 (057) (2020).

[2]. Luu Hong Dung, Tong Minh Duc, Bui The Truyen. "Variant of OTP cipher with symmetric-key solution". Journal of Science and Technique - Section on Information and Communication Technology (ICT) - No. 16 (2020), Le Quy Don Technical University. ISSN: 1859 - 0209. DOI: 10.56651/lqdtu.jst.v9.n02.210.ict DOI: https://doi.org/10.56651/lqdtu.jst.v9.n02.210.ict

[3]. Luu Hong Dung, Nguyen Anh Viet, Doan Thi Bich Ngoc. An encryption and authentication algorithm developed based on the one – time pad cipher. Journal of Military Science and Technology, ISSN: 1859 - 1403. (2020). DOI: 10.54939/1859-1043.j.mst.87-93.

[4]. Gilbert Vernam . US Patent 1,310,719. (1919). DOI: https://doi.org/10.1136/bmj.1.3037.310

[5]. ISO/IEC 15946: Information technology – Security techniques – Cryptographic Techniques Based on Elliptic Curves, (1999).

[6]. ANSI X9.62. Public Key Cryptography for the Financial Services Industry: Elliptic Cuve Digital Signature Algorithm (ECDSA), (1999).

[7]. National Institute of Standards and Technology, NIST FIPS PUB 186-4. Digital Signature Standard, U.S. Department of Commerce, (2013).

[8]. National Institute of Standards and Technology, NIST FIPS PUB 180-1. (1995).

[9]. Lawrence C. Washington. "Elliptic curves – Number Theory and Cryptography". Chapman & Hall/CRC, (2003).

Downloads

Published

30-12-2022

How to Cite

Luu Hong Dung. “A Method for Constructing Public-Key Block Cipher Schemes Based on Elliptic Curves”. Journal of Military Science and Technology, no. CSCE6, Dec. 2022, pp. 114-21, doi:10.54939/1859-1043.j.mst.CSCE6.2022.114-121.

Issue

Section

Research Articles

Categories