International Journal of Computer Networks and Applications (IJCNA) Volume 2, Issue 3, May June (2015) ISSN: 2395-0455 ©EverScience Publications 151 RESEARCH ARTICLE Improved Signcryption Algorithm for Information Security in Networks R. Bhagavath Nishanth ECE (4th Year), Velammal Engineering college, Chennai-66, India Dr. B. Ramakrishnan Associate Professor, Department of Computer Science and Research Centre S.T. Hindu College, Nagercoil, India. M. Selvi Research Scholar, S.T. Hindu College, Nagercoil, India. Abstract In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion’s share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique. Index Terms Cryptographic, Signcryption, KEM, DEM, KDF. 1. INTRODUCTION Of late, the big bang expansion of the mobile computing devices, such as the laptops, personal digital assistants (PDAs) and handheld digital devices has triggered an incredible transformation in the ever-zooming domain of computing. In fact, computing does not attempt to depend entirely on the potential furnished by the personal computers, and the conception of omnipresent computing has surfaced and emerged as one of the hot investigation topics in the unfathomable horizon of computer science [1]. In the omnipresent computing scenario, individual users have the facilities to employ, simultaneously a host of electronic platforms which offer them an olive branch to access all the needed data regardless of time and place. [2]. In this regard, the VANETs (Vehicular Ad hoc Networks) and Mobile Ad hoc Network (MANET) are doing their stylish round as the exceedingly mobile wireless ad hoc networks, casting a significant part in the public safety communications and commercial applications. The fundamental function of cryptography is focused on preserving the confidentiality of messages communicated through various public communication channels. With an eye on programming a message in a way as to keep it at bay from the access of an eavesdropper, we elegantly employ the encryption techniques which invariably deploy certain confidential data such as a key [1]. The privacy and legitimacy have emerged as the safety targets which are highly essential for a safe communication by means of an apprehensive channel. The encryption techniques are effectively employed to usher in privacy and the digital signature techniques advocate enforceability [2]. The safety of communications can be effectively offered by the encryption and digital signature which represent the two basic cryptographic systems. In fact, till last decade, they were deemed as the not worthy and distinctive building blocks of several cryptographic techniques [3]. In the public key systems, a conventional technique digitally signs a communication accompanied by an encryption constituting the signature-then-encryption which is found plagued by two hassles such as the inferior efficacy and the elevated expenses of the related summation, and the incompetency of any random technique to provide the necessary safety. In this regard, the signcryption constitutes a reasonably novel cryptographic approach which in a single coherent stroke successfully performs the functionalities of digital signature and encryption, thereby saving an incredible amount of the computational overheads and communication expenses vis-à-vis the time-honored signature-then-encryption system. Zheng [4] was credited with launching the debut digital signcryption technique which handed on a platter the twin fruits of secrecy and verification in a single sound step coupled with the condensed computational cost and communication expenses compared to the sign then encrypt