CFP last date
20 May 2024
Reseach Article

Aircraft Identification Technique using Public-Key Cryptosystem

by Sadiq J. Abou-loukh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 10
Year of Publication: 2014
Authors: Sadiq J. Abou-loukh
10.5120/18553-5988

Sadiq J. Abou-loukh . Aircraft Identification Technique using Public-Key Cryptosystem. International Journal of Computer Applications. 106, 10 ( November 2014), 1-4. DOI=10.5120/18553-5988

@article{ 10.5120/18553-5988,
author = { Sadiq J. Abou-loukh },
title = { Aircraft Identification Technique using Public-Key Cryptosystem },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 10 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number10/18553-5988/ },
doi = { 10.5120/18553-5988 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:39:01.526738+05:30
%A Sadiq J. Abou-loukh
%T Aircraft Identification Technique using Public-Key Cryptosystem
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 10
%P 1-4
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new approach for identifying a friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Two schemes of public-key cryptosystem namely: RSA and knapsack public-keys are considered, which provide higher security than conventional identification methods. The practical aspects of using such systems for aircraft identification purposes are discussed. Computer simulation examples are also presented to illustrate the identification procedure.

References
  1. Faulconbridge, I. , 2002. Radar Fundamentals. Argos Press pty. Ltd.
  2. Grigoriev, D. , Hirsch, E. , and Pervyshev, K. 2009. A Complete Public Key Cryptosystem. Groups Complexity Cryptology, Vol. 1, No. 1, 1-12.
  3. Naccache, D. , and Stern, J. 1997. A New Public Key Cryptosystem. In : W. Fumy (Ed. ). Advances in Cryptology, EUROCRYPT 97. 27-36.
  4. Wiener, M. J. 1994. Efficient DES key Search. Technical Report TR-244, School of Computer Science. Carleton University.
  5. Ajtai, M. and Work, C. D. 1999. A Public Key Cryptosystem. In Proc. 39th Annual ACM Symposium on the Theory of Computing.
  6. Marjono, M. 2002. The Rivest, Shamir, Adelman (RSA) Public Key Cryptosystem and Cyclic Code. Journal Integral. Vol. 7, No. 1, 1-6.
  7. Abood, Q. , Younis, M. , and Othman, M. 2011. RSA Security Enhancement. ECCCM 2011. 241-245.
  8. Nguyen, P. , and Stern, J. 1997. Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. In: B. S. Kaliski (Ed. ). Advances in Cryptology-CRYPTO 97 (LNCS 1294). 198-212.
  9. Wang , B. , Wu, Q. and Hu, Y. , 2007. A Knapsack Based Probabilistic Encryption Scheme. Information Sciences. Vol. 77, Issue 19, 3981-3994.
  10. Lee, M. S. 2013. Improved Cryptanalysis of a Knapsack Based Probabilistic Encryption Scheme. Journal Information Science, Vol. 222, 779-783.
Index Terms

Computer Science
Information Sciences

Keywords

Public-key cryptosystem IFF Cryptographic security