International Journal of Computer Networks and Applications (IJCNA)
Volume 2, Issue 3, May – June (2015)
ISSN: 2395-0455 ©EverScience Publications 151
RESEARCH ARTICLE
Improved Signcryption Algorithm for Information
Security in Networks
R. Bhagavath Nishanth
ECE (4th Year), Velammal Engineering college, Chennai-66, India
Dr. B. Ramakrishnan
Associate Professor, Department of Computer Science and Research Centre
S.T. Hindu College, Nagercoil, India.
M. Selvi
Research Scholar, S.T. Hindu College, Nagercoil, India.
Abstract – In a Cryptographic primordial, the functions of the
digital signature and the public key encryption are concurrently
carried out. To safely communicate incredibly large messages, the
cryptographic primordial known as the signcryption is effectively
employed. Though a lion’s share of the public key based
mechanism are appropriate for miniature messages, the hybrid
encryption (KEM-DEM) offers a proficient and realistic method.
In this document, we are cheered to launch an improved
signcryption method, which takes cues from the KEM and DEM
approaches. The KEM algorithm employs the KDF approach to
summarize the symmetric key. The DEM algorithm makes use of
the Elliptic curve cryptography technique to encrypt the original
message. With an eye on safety aspects, we have testes three
attacks and we are cheered to state that the attackers have failed
miserably in locating the safety traits of our improved
signcryption technique.
Index Terms – Cryptographic, Signcryption, KEM, DEM, KDF.
1. INTRODUCTION
Of late, the big bang expansion of the mobile computing
devices, such as the laptops, personal digital assistants (PDAs)
and handheld digital devices has triggered an incredible
transformation in the ever-zooming domain of computing. In
fact, computing does not attempt to depend entirely on the
potential furnished by the personal computers, and the
conception of omnipresent computing has surfaced and
emerged as one of the hot investigation topics in the
unfathomable horizon of computer science [1]. In the
omnipresent computing scenario, individual users have the
facilities to employ, simultaneously a host of electronic
platforms which offer them an olive branch to access all the
needed data regardless of time and place. [2].
In this regard, the VANETs (Vehicular Ad hoc Networks) and
Mobile Ad hoc Network (MANET) are doing their stylish
round as the exceedingly mobile wireless ad hoc networks,
casting a significant part in the public safety communications
and commercial applications. The fundamental function of
cryptography is focused on preserving the confidentiality of
messages communicated through various public
communication channels. With an eye on programming a
message in a way as to keep it at bay from the access of an
eavesdropper, we elegantly employ the encryption techniques
which invariably deploy certain confidential data such as a key
[1].
The privacy and legitimacy have emerged as the safety targets
which are highly essential for a safe communication by means
of an apprehensive channel. The encryption techniques are
effectively employed to usher in privacy and the digital
signature techniques advocate enforceability [2]. The safety of
communications can be effectively offered by the encryption
and digital signature which represent the two basic
cryptographic systems. In fact, till last decade, they were
deemed as the not worthy and distinctive building blocks of
several cryptographic techniques [3].
In the public key systems, a conventional technique digitally
signs a communication accompanied by an encryption
constituting the signature-then-encryption which is found
plagued by two hassles such as the inferior efficacy and the
elevated expenses of the related summation, and the
incompetency of any random technique to provide the
necessary safety. In this regard, the signcryption constitutes a
reasonably novel cryptographic approach which in a single
coherent stroke successfully performs the functionalities of
digital signature and encryption, thereby saving an incredible
amount of the computational overheads and communication
expenses vis-à-vis the time-honored signature-then-encryption
system. Zheng [4] was credited with launching the debut
digital signcryption technique which handed on a platter the
twin fruits of secrecy and verification in a single sound step
coupled with the condensed computational cost and
communication expenses compared to the sign then encrypt