期刊论文详细信息
Cryptography
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
Massimo Regoli1  Koki Jimbo2  Satoshi Iriyama2 
[1] DICII, Engineering Faculty Via del Politecnico Universitá di Roma Tor Vergata, 1, 00133 Roma, Italy;Information Science Department, Tokyo University of Science, 2641 Yamazaki, Noda, Chiba 278-0022, Japan;
关键词: public key exchange;    security;    asymmetric;    asymmetric algorithm;    cryptography;    framework;   
DOI  :  10.3390/cryptography4030021
来源: DOAJ
【 摘 要 】

A new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her public key by using some part of the public keys from Bob. Then, the preparation and calculation processes are essentially asymmetric. This algorithms has several free parameters more than the usual symmetric PKA algorithms and the velocity of calculation is largely dependent on the parameters chosen; however, the performance of it has not yet been tested. The purpose of our study was to discuss efficient parameters to share the key with high speeds in SAA-5 and to optimize SAA-5 in terms of calculation speed. To find efficient parameters of SAA-5, we compared the calculation speed with Diffie–Hellman (D-H) while varying values of some parameters under the circumstance where the length of the secret shared key (SSK) was fixed. For optimization, we discuss a more general framework of SAA-5 to find more efficient operations. By fixing the parameters of the framework properly, a new PKA algorithm with the same security level as SAA-5 was produced. The result shows that the calculation speed of the proposed PKA algorithm is faster than D-H, especially for large key lengths. The calculation speed of the proposed PKA algorithm increases linearly as the SSK length increases, whereas D-H increases exponentially.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:3次