Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance

IF 1.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Cryptography Pub Date : 2024-06-02 DOI:10.3390/cryptography8020023
Younes Lahraoui, S. Lazaar, Youssef Amal, Abderrahmane Nitaj
{"title":"Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance","authors":"Younes Lahraoui, S. Lazaar, Youssef Amal, Abderrahmane Nitaj","doi":"10.3390/cryptography8020023","DOIUrl":null,"url":null,"abstract":"To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The intricacies of this process can greatly affect the overall security and efficiency of the cryptosystem, reflecting security vulnerabilities observed in many existing schemes that utilize ElGamal ECC-based encryption. In this paper, we introduce an innovative hash-based technique for securely embedding messages into EC points before encryption. A random parameter and a shared secret point generated through the EC Diffie–Hellman protocol are used to bolster the scheme’s security. The security of the proposed method is evaluated against various attack models; moreover, the complexity, and sensitivity of the encryption scheme, as well as its inputs, are analyzed. The randomness assessment of the ciphertext was performed using the NIST statistical test suite. Additionally, we propose a mechanism to ensure the integrity of the message by securely appending a tag to the ciphertext. As a consequence, a comprehensive analysis of our scheme demonstrates its effectiveness in maintaining data security and integrity against various attack models. The algorithm also meets more criteria such as the strict avalanche criterion, linear complexity, and operability.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.8000,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/cryptography8020023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The intricacies of this process can greatly affect the overall security and efficiency of the cryptosystem, reflecting security vulnerabilities observed in many existing schemes that utilize ElGamal ECC-based encryption. In this paper, we introduce an innovative hash-based technique for securely embedding messages into EC points before encryption. A random parameter and a shared secret point generated through the EC Diffie–Hellman protocol are used to bolster the scheme’s security. The security of the proposed method is evaluated against various attack models; moreover, the complexity, and sensitivity of the encryption scheme, as well as its inputs, are analyzed. The randomness assessment of the ciphertext was performed using the NIST statistical test suite. Additionally, we propose a mechanism to ensure the integrity of the message by securely appending a tag to the ciphertext. As a consequence, a comprehensive analysis of our scheme demonstrates its effectiveness in maintaining data security and integrity against various attack models. The algorithm also meets more criteria such as the strict avalanche criterion, linear complexity, and operability.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用椭圆曲线加密法确保数据交换安全:基于哈希值的新型信息映射和完整性保证方法
为确保敏感数据的安全,椭圆曲线加密法(ECC)作为一种非对称方法,在安全性和效率之间取得了平衡。然而,将信息嵌入椭圆曲线(ECC)点是一项重大挑战。这一过程的复杂性会极大地影响密码系统的整体安全性和效率,这反映了在许多利用基于 ElGamal ECC 加密的现有方案中观察到的安全漏洞。在本文中,我们引入了一种基于哈希值的创新技术,用于在加密前将信息安全地嵌入到 EC 点中。通过 EC Diffie-Hellman 协议生成的随机参数和共享秘密点被用来增强方案的安全性。针对各种攻击模型对所提方法的安全性进行了评估;此外,还分析了加密方案及其输入的复杂性和敏感性。使用 NIST 统计测试套件对密文的随机性进行了评估。此外,我们还提出了一种机制,通过在密文中安全地附加标签来确保信息的完整性。因此,对我们的方案进行的全面分析表明,它能有效地维护数据的安全性和完整性,抵御各种攻击模式。该算法还符合更多标准,如严格的雪崩标准、线性复杂性和可操作性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Cryptography
Cryptography Mathematics-Applied Mathematics
CiteScore
3.80
自引率
6.20%
发文量
53
审稿时长
11 weeks
期刊最新文献
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles Improve Parallel Resistance of Hashcash Tree Public Key Protocols from Twisted-Skew Group Rings
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1