Abstract
This paper reports a research on the development of an efficient public key cryptosystem that uses simple matrix operations to encrypt and decrypt messages. The new cryptosystem has the following advantages: a) It is “self-sufficient” and needs not to be integrated with any symmetric cryptosystem. This new asymmetric cryptosystem is supposed to work directly on large quantity of user data and provide an average encryption/decryption speed much higher than mixed cryptosystems currently in use; b) It is good for implementation with constrained hardware. Both encryption and decryption are performed with simple algorithms and require less computing power than existing public key cryptosystems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Diffie, W. and Hellman, M.E.: New directions in cryptography, IEEE Transactions in Information Theory, vol. IT-22, (1976)
Rivest R. L. et al: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, vol. 21(1978)
Rabin, M. O.: Digital Signatures and Public Key Functions as Intractable as Factorization, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR-212(1979)
Elgamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm, IEEE Trans. On Information Theory, vol. 31(1985)
Koblitz, N.: Elliptic curve cryptosystems, Mathematics of Computation, Vol 48(1987)
Schneier, B.: Applied Cryptography, John Wiley & Sons, NY(1996)
Wells, D., The Penguin Dictionary of Curious and Interesting Numbers, Penguin Books, NewYork(1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zheng, J. (2002). A New Public Key Cryptosystem for Constrained Hardware. In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_26
Download citation
DOI: https://doi.org/10.1007/3-540-45811-5_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44270-7
Online ISBN: 978-3-540-45811-1
eBook Packages: Springer Book Archive