scispace - formally typeset
Search or ask a question
Topic

Plaintext-aware encryption

About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.


Papers
More filters
Proceedings ArticleDOI
01 Dec 2009
TL;DR: This paper proposed an asymmetric cryptosystem for encrypting long messages, which is not only efficient but also secure, and uses elliptic curve cryptosSystem.
Abstract: Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt long messages. In case of symmetric cryptosystems, it creates the problem of key management. So to encrypt long messages, we usually, take the help of both symmetric and asymmetric cryptosystems. In this paper, we proposed an asymmetric cryptosystem for encrypting long messages, which is not only efficient but also secure. In consideration of the aspect of efficiency and computation, our proposed scheme uses elliptic curve cryptosystem.

14 citations

Proceedings Article
15 Feb 2009
TL;DR: The proposed RC6 algorithm has the almost same speed compared with the conventional RC6 one and improves encryption security by inserting the symmetric layer because a differential and linear analysis has a difficulty in analyzing an encrypted stream.
Abstract: In this paper, we propose an improved RC6 encryption algorithm that have the same structure of encryption and decryption. So far, conventional RC6 algorithms have difference structure of encryption and decryption. We devise our algorithm by inserting a symmetric layer using simple rotation and XOR operations, in which the half of whole RC6 rounds uses encryption procedure and the rest of it are employs decryption one. The symmetry layer is put between encryption part and decryption one. The proposed RC6 algorithm has the almost same speed compared with the conventional RC6 one. Nevertheless, the proposed algorithm improves encryption security by inserting the symmetric layer because a differential and linear analysis has a difficulty in analyzing an encrypted stream. The proposed algorithm will be useful to the applications which require the same procedure of encryption and decryption such as light mobile devices and RFIDs.

14 citations

Proceedings ArticleDOI
25 Jun 2006
TL;DR: In this paper, a novel broadcast group oriented encryption scheme, any receiver in the designated group can independently decrypt the ciphertext, and both ciphertext and private keys are of constant size.
Abstract: In this paper, we present a novel broadcast group oriented encryption. In our scheme, any receiver in the designated group can independently decrypt the ciphertext. In addition, compared with other schemes, both ciphertext and private keys are of constant size. Therefore, it is more efficient than the ordinary measures for a sender to encrypt a message for a group.

14 citations

Proceedings ArticleDOI
M. Asim1, Varun Jeoti1
01 Nov 2007
TL;DR: The proposed image encryption scheme is less computationally intensive and far excels in security compared to the representative multimedia encryption schemes, and is shown to be secure against differential and linear cryptanalysis.
Abstract: Multimedia security has become serious issue due to prevalence of multimedia technology and, at the same time, rapid progress and wide acceptance of Internet in our society today. In this paper an image encryption scheme is proposed based on generalized logistic map, AES S-box, ciphertext feedback, piecewise linear chaotic maps. The cryptosystem is based on AES S-box, generalized logistic map and ciphertext feedback. A bank of piecewise linear chaotic maps is used to extract the secret chaotic key stream that is used for masking purpose. The proposed image encryption scheme is less computationally intensive. At the same time, it far excels in security compared to the representative multimedia encryption schemes. The proposed scheme is shown to be secure against differential and linear cryptanalysis.

14 citations

Journal ArticleDOI
TL;DR: A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm is being proposed by performing block rotation based upon the certain angles achieves better diffusion, which further enhances the security of cipher.
Abstract: The great advances in digital data communication have led to high desire for a secured and reliable transmission. Advances in satellite communication like packet radio technology and the development of high speed LAN's have created demand for secured applications. Security measures are needed to protect data during transmission. Previous work has characterized reliable cryptosystem for applications like interactive communication, multimedia and data transfer. In this paper, a modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm is being proposed. By performing block rotation based upon the certain angles achieves better diffusion, which further enhances the security of cipher.

14 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Hash function
31.5K papers, 538.5K citations
87% related
Key (cryptography)
60.1K papers, 659.3K citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202318
202230
20211
20202
20194
201822