Home General Development of unconventional asymmetric cryptographic mechanisms

Development of unconventional asymmetric cryptographic mechanisms

Development of unconventional asymmetric cryptographic mechanisms
By Javier and Gloria Areitio
Dr. J. Areitio Bertolín Director of the Networks and Systems Research Group and Professor at the Faculty of Engineering of the University of Deusto.
Dr. G. Areitio Bertolin is a professor at the Applied Computer Science Laboratory of the University of the Basque Country (UPV / EHU)

In this article, five public key or asymmetric cryptographic mechanisms (EG over GF(2^4), BG, EG over Zp, MH and CR styles) with different security levels, computing power needs and usability are synthesized and analyzed. . All of them allow multiple functions such as performing encryption operations, conventional and blind electronic signatures, one-way functions such as summary (or hash) and other more sophisticated operations.