Explore chapters and articles related to this topic
Communication in VANET
Published in Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde, VANET, 2021
Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde
The IEEE 1609.2 standard uses elliptic curve digital signature algorithm (ECDSA) for digital signatures and elliptic curve integrated encryption scheme (ECIES) for public key encryption. Using ECDSA and ECIES, a public key is a point on an elliptic curve that can be represented by the x- and y-coordinates of this point on the elliptic curve. The IEEE 1609.2 standard defines a public key format, which can be used to encode an ECDSA or ECIES public key. The algorithm field indicates which public key algorithm this public key should be used with. The current IEEE 1609.2 standard supports the following public key algorithms: ECDSA over two elliptic curves defined by National Institute of Standards and Technology (NIST) over prime fields: the P244 curve for 112-bit security strength and the P256 curve for 128-bit security strengthECIES over the P256 elliptic curve defined by NIST.
Public-Key Encryption
Published in Jonathan Katz, Yehuda Lindell, Introduction to Modern Cryptography, 2020
where Enc′ denotes a CPA-secure private-key encryption scheme and c′ denotes EnckE′(m). DHIES, the Diffie–Hellman Integrated Encryption Scheme, can be used generically to refer to any scheme of this form, or to refer specifically to the case when the group G is a cyclic subgroup of a finite field. ECIES, the Elliptic Curve Integrated Encryption Scheme, refers to the case when G is an elliptic-curve group. We remark that in Construction 12.23 it is critical to check during decryption that c, the first component of the ciphertext, is in G. Otherwise, an attacker might request decryption of a malformed ciphertext 〈c, c′, t〉 in which c∉G; decrypting such a ciphertext (i.e., without returning ⊥) might leak information about the private key.
Cloud computing security challenges and their solutions
Published in Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba, Security and Privacy Trends in Cloud Computing and Big Data, 2022
Rimsha Khalid, Khowla Khaliq, Muhammad Imran Tariq, Shahzadi Tayyaba, Muhammad Arfan Jaffar, Muhammad Arif
Manoj Tyagi and others in their article mainly discuss data correctness, its security, and user authentication. Manoj Tyagi and others formulated the problems and propose a framework, which is based on proposed ECIES (Elliptic curve integrated encryption scheme), TLA (two-level authentication), and AES (advanced encryption standard), AE (avalanche effect), POR (proof of retrievability), and CMA/ES (covariance matrix adaptation evolution strategies). A CMA evolution strategy with AE is implemented to detect the enhanced cipher for security betterment. POR is used for data recovery and data integrity [13].
Security in Internet of Drones: A Comprehensive Review
Published in Cogent Engineering, 2022
Snehal Samanth, Prema K V, Mamatha Balachandra
Ozmen et al. have proposed an efficient cryptography framework for small aerial drones. The proposed framework has used low-cost public-key cryptography (PKC) primitives and low-cost symmetric key primitives. The low-cost PKC primitives are an integration of Boyko-Peinado-Venkatesan (BPV) FourQ on ECDH protocol, integration of BPV FourQ on Schnorr digital signature, and integration of BPV FourQ on Elliptic Curve Integrated Encryption Scheme (ECIES) protocol. The low-cost symmetric key primitives are CHACHA20 stream cipher, CHACHA-POLY as authenticated encryption scheme, and POLY1305 as MAC protocol. The security of the proposed framework depends on the FourQ curve and BPV precomputation technique. The experiment for the proposed framework was conducted on Crazyflie 2.0. FourQ curve provides the same security as that of secp256k1 curve. The security of the proposed framework is almost the same as that of the standard framework. The key exchange of the proposed framework has an energy consumption of just 3.61% of the key exchange energy consumption of the standard framework. The digital signature energy consumption of the proposed framework has an energy consumption of just 2.83% of the digital signature energy consumption of the standard framework. The proposed framework’s authenticated encryption has an energy consumption of 14.42% of the standard framework. The proposed framework’s integrated public-key encryption energy consumption is just 3.61% of the integrated public-key encryption energy consumption of the standard framework (Ozmen & Yavuz, 2018).