Multiple Private Keys with NTRU Cryptosystem
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
Each organization needs to protect their useful information from unauthorized users in wireless environment. Every person needs to access confidential information in less time. That means the encryption and decryption times will be as possible as minimum with providing at maximum security. It is a challenging task to meet both fastest encryption/decryption times. In Public cryptosystem, both Public and Private keys are essential to perform encryption/decryption. In this paper, we proposed a novel algorithm to generate single Public Key associated with many different multiple Private Keys by using original NTRU algorithm. Recipients can decrypt message using their own authenticated multiple Private Keys. The main advantage of our novel algorithm is to save more encryption time and computational power. Therefore, the proposed algorithm is efficient and economical in terms of computational time.
Authors and Affiliations
Dr. Rakesh Nayak, Ashok Kumar Nanda, Prof. (Dr. ) Lalit Kumar Awasthi
Detection and Prevention Of Cooperative Black Hole Attack in a MANET
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network random...
Highly Secured High Throughput Efficient VLSI Architecture for AES Implementations
The AES algorithm can be implemented in different styles at programming levels. The paper compares the hardware efficiency of different AES implementations with respect to their area, speed and power performance espec...
Fixed Point Lms Adaptive Filter Using Partial Product Generator
The area and power efficiency is very important for every circuit and its applications. Here I present an efficient architecture of adaptive filter with partial product generator and delayed lms algorithm is also used...
To Demonstrate Best Cooperative Caching For Provisioning Cost Reduction In Networks
Social Wireless Networks (SWNETs) can be produced using ad hoc wireless associations amid the devices. Electronic object caching in such SWNETs are shown to be competent to dwindle the content provisioning cost which...
Requirement Elicitation in Web Applications: Challenges
Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate s...