CFP last date
22 April 2024
Reseach Article

Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction

by Sohit Kumar, Ashish Vashisth
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 19
Year of Publication: 2013
Authors: Sohit Kumar, Ashish Vashisth
10.5120/13002-0118

Sohit Kumar, Ashish Vashisth . Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction. International Journal of Computer Applications. 74, 19 ( July 2013), 23-27. DOI=10.5120/13002-0118

@article{ 10.5120/13002-0118,
author = { Sohit Kumar, Ashish Vashisth },
title = { Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 19 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number19/13002-0118/ },
doi = { 10.5120/13002-0118 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:43.817604+05:30
%A Sohit Kumar
%A Ashish Vashisth
%T Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 19
%P 23-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper discuses comparatively more efficient and cost effective scheme of El Gamal Cryptosystem by introducing the concept of using the established cryptosystems into message feedback mode. The idea behind this is, "an established cryptographic scheme can be used to initiate any communication, and further users may switch to some lightweight process so that the degree of secrecy is maintained by means of the public key cryptosystem and the performance is achieved by using some other lightweight process. Approach discussed in this paper is of using message itself as One Time Pad (OTP), because any automation can't produce any random pad than a human being, and their messages posses same property. The length of Key used in El Gamal encryption and size of OTP determines the level of secrecy offered by the proposed system. Further a discussion is made upon the other dimensions of degree of security provided in such implementation. So as a result an applied approach is presented to design a data security mechanism for which users will use message itself as a One Time Pad and El Gamal Cryptosystem to initiate the operations and subsequent steps will involve simple XOR operations for cryptographic purpose.

References
  1. T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms". In Proceedings of CRYPTO 84 on Advances in Cryptology, pages 10–18, New York, NY, USA, Springer-Verlag New York, Inc. 1985.
  2. A. M. Odlyzko, "Discrete logarithms in finite fields and their cryptographic significance", AT&T Bell Laboratories Murray Hill, New Jersey, APR 1998
  3. Cohen, H. , Frey, G. (editors): Handbook of elliptic and hyper elliptic curve cryptography. Discrete Math Appl, Chapman & Hall/CRC (2006)
  4. Delfs, Hans & Knebl, Helmut. "Symmetric-key encryption", Introduction to cryptography: principles and applications. Springer, ISBN 9783540492436, 2007
  5. Wikipedia, "Session (computer science)", http://en. wikipedia. org/wiki/Session_(computer_science) Ret. May 2013
  6. Miller, Frank, Telegraphic code to insure privacy and secrecy in the transmission of telegrams. C. M. Cornwell. 1882
  7. J. Kowalchuk, B. P. Schanning, and S. Powers, Communication privacy: Integration of public and secret key cryptography, NTC Conference Record, Vol. 3, pp. 49. 1. 1-49. 1. 5, Dec. 1980.
  8. William Stallings, Cryptography and Network Security, Principles and Practice, Third edition, Pearson Education (Singapore), 2003
  9. D. E. Knuth, The Art of Computer Programming: Vol. 2, Semi numerical Algorithms, 2nd ed. Addison-Wesley 1981.
  10. David D. Clark, Van Jacobson, John Romkey, and Howard Salwen, "An analysis of TCP processing overhead" IEEE Communication, MIT, 1984, @ groups. csail. mit. edu/ana/Publications/PubPDFs/An%20Analysis%20of%20TCP%20Processing%20Overhead. pdf
  11. R. Merkle, Secrecy, authentication, and public key systems, Ph. D. dissertation, Dept. of Electrical Engineering, Stanford Univ. , 1979
  12. Shannon, Claude E. (October 1949). "Communication Theory of Secrecy Systems", Bell System Technical Journal (USA: AT&T Corporation) 28 (4): 656–715. Retrieved June 2013
  13. Sohit Kumar, Praveen Kr. Vishnoi, Rahul Yadav, Dhirendra Yadav, "A Lightweight Stream Cipher for Mobile Devices Using RSA & Message Feedback", in the proceedings of IGTT' 2011, IET Alwar, Dec 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Logarithm El Gamal Encryption One Time Pad Cipher Stream Key Feedback Message Feedback Mode