首页    期刊浏览 2024年10月07日 星期一
登录注册

文章基本信息

  • 标题:A Robust and Hybrid Cryptosystem for Identity Authentication
  • 本地全文:下载
  • 作者:Ali Takieldeen ; Said H. Abd Elkhalik ; Ahmed S. Samra
  • 期刊名称:Information
  • 电子版ISSN:2078-2489
  • 出版年度:2021
  • 卷号:12
  • 期号:3
  • 页码:104
  • DOI:10.3390/info12030104
  • 出版社:MDPI Publishing
  • 摘要:With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending on internet protocol (IP) networks, especially after the COVID-19 pandemic. The huge application domain’s infrastructure, which depends on IoT, requires a trusted connection to guarantee security and privacy while transferring data. This paper proposes a hybrid identity authentication pipeline that integrates three schemes, namely, an elliptic curve cryptography (ECC) scheme is integrated with the Ong, Schnorr, and Shamir (OSS) signature scheme and chaotic maps. The latter satisfies both security and guarantee criteria. The novelty of the proposal is in using chaotic mapping and a cyclic group to deduce a substitution box (S-Box) and a reversible matrix as a portion of the OSS signature equation. The ECC-based security part is an efficient public key cryptography mechanism with less computational cost, which makes it the most convenient to be used in IoT devices for authentication and privacy. The strength of the proposed scheme relies on combining the discrete logarithm problem (DLP) and integer factorization problem (IFP). The proposed approach was simulated using Lab-View and compared with other state-of-the art schemes. Extensive simulation results and analysis of the security and time rendering results confirmed its durability against different types of attacks, such as linear and differential attacks.
  • 关键词:authentication; IoT; differential attack; discrete logarithm problem; elliptic curve cryptosystem; integer factorization; linear attack; OSS signature; reversible matrix authentication ; IoT ; differential attack ; discrete logarithm problem ; elliptic curve cryptosystem ; integer factorization ; linear attack ; OSS signature ; reversible matrix
国家哲学社会科学文献中心版权所有