Hash Analysis

1458 Words3 Pages

Hash Functions:

The hash functions are used to convert messages of variable length into fixed length. Two messages are identical only if the hash values are same.

Basic functioning of the ECC:

Two very large primes are selected first and multiplied to obtain the maximum value limit. Public key is selected as a random number between zero and maximum value. Using extended Euclidian algorithm a private key is generated for the public key.

Multiplying the selected number by itself (pub times) and rounding of the value based on maximum encrypts the message.To decrypt, the encrypted message is multiplied by itself priv key times (priv times).

IV. IBE-LITE SOLUTION

The examples discussed earlier make use of standard IBE which is not compatible with the sensor in a BSN. Solution for this is an IBE-Lite; a lightweight IBE that has the properties of standard IBE, and compatible with a BSN sensor is devised. The ability to use an arbitrary string to generate a public key, and the ability to create a public key separately from the corresponding secret key are few useful properties. IBE-Lite makes use of elliptic curve cryptography (ECC), a public key encryption system suitable for BSN [2].

To execute ECC, we need to derive a secret key x, and public parameters (P, y, p, q, h(.)). Table I shows the size of these parameters in bits. In this paper, we consider encrypting a message m using public key y as ECCEncrypt(m, y), and decrypting the cipher-text c generated by the ECCEncrypt using the secret key x using ECCDecrypt(c, x). Details for generating the parameters as well as ECCEncrypt and ECCDecrypt are described in the following text.

Fig. 1 IBE System

A. IBE-Lite

We derive the following IBE-Lite primitives, setup, keygen, en...

... middle of paper ...

... protected from the storage site since the storage site knows nothing important from the hints given.

V.SECURITY ANALYSIS

The basic primitives are initially analyzed, followed by an analysis of all the protocols.

Analysis of Basic Primitives

In the first we pick n secret and n corresponding public keys. Using one secret key andhashing output of the string function, the doctor is unable to determine the master secret X because there is a lot of x. When the doctor has access to n different secret keys, only then can he determine X.

The discrete logarithm property is not violated by usingxstr and ystr as the private key and public key derived from string str. It is difficult to determine x given y and P ,because they are a result of addition of points. Both Encrypt and Decrypt are well secure since both dependupon well-known ECC encryption and decryption methods.

Open Document