Author : M.Jeyanthi 1
Date of Publication :22nd March 2018
Abstract: In this paper we give an overview of public-key cryptographic schemes based on non-commutative groups with special consideration to braid groups and we have to analysis several commonly used light weight algorithm public key-exchange protocols with the aim of establishing the best algorithms for lightweight cryptography in critical infrastructure and emergency scenarios. Most of the method currently in use are based on arithmetic over finite field. The potential advent of quantum computer is very troubling because all of these cryptosystem are easily broken by such machine. Braid group based on non-commutative algebraic structure over infinite field .Braid group have certain properties that make them easily amenable to digital computation. The main contributions of this paper are: 1.Performance analysis of several state-of-the-art public-key cryptographic algorithms like NTRU Encryption, Braid groups etc. In order to find those that are most suitable for low power computing platforms 2.Implementing security framework based on the analyses public-key key-exchange cryptographic algorithms in IOT devices. Internet of Things (IoT) enables physical things to communicate, compute and take decisions based on any network activity. *This calls for a secure solution for communication among heterogeneous devices. *In heterogeneous environment motive of each user in IoT can be different in form of communication and computation and is difficult to be judged
Reference :
-
- Hoffstein J., Lieman D., Pipher J., Silverman J. “NTRU: A Public Key Cryptosystem”, NTRU Cryptosystems, Inc.
- Parasitism C, Prada J. “Evaluation of Performance Characteristics of Cryptosystem Using Text Files”, Journal of Theoretical and Applied Information Technology.
- Hoffstein J., Pipher J., Silverman J. An Introduction to Mathematical Cryptography, New York,2008
- Hoffstein J., Pipher J., Silverman J. “ NTRU – A ring based public key cryptosystem”
- Andrea Pellegrini, Valeria Bertacco and Todd Austin (2010), “Fault-Based Attack of RSA Authentication”
- Anoop MS (2007),“Public Key Cryptography Applications Algorithms and Mathematical Explanations”.
- Aydos, M., Sunar, B., Koç, Ç.K., (1998), “An Elliptic Curve Cryptography Based Authentication and