International Journal of Security and Its Applications Vol.9, No.11 (2015), pp.217-230 http://dx.doi.org/10.14257/ijsia.2015.9.11.21 ISSN: 1738-9976 IJSIA Copyright ⓒ 2015 SERSC Implementation of Schnorr Signcryption Algorithm on DSP Aya Elshobaky 1 , Mohamed Rasslan 2 and Shawkat Guirguis 3 1 Alexandria University, Alexandria, Egypt 2 Electronics Research Institute, Giza, Egypt 3 Alexandria University, Alexandria, Egypt 1 aya.elshobaky@gmail.com, 2 mohamedraslan@eri.sci.eg, 3 shawkat_g@yahoo.com Abstract The lack of data security in public mobile telecommunication system increases the need for a strong data protection and security mechanisms. Cryptography is considered as one of the key elements that provides security for mobile systems. Signcryption algorithm, which is based on public key cryptography, provides both confidentiality and authenticity in one step. Moreover, hardware implementations of cryptographic algorithms provide scalable solutions to enhance the level of security of the existing hardware. In this paper, we present a case study on using a DSP board to construct a secure communication channel. We use the constructed DSP board as a hardware cryptosystem to increase the security of transmitted data using any mobile communication system. We evaluate the performance by computing the consumed time by encryption/decryption process, while implementing the Schnorr Signcryption scheme on a DSP. Furtheremore, we propose an enhanced model of applying multiple DSP using pipelines and parallelization technique to decrease the consumed time in the whole process. Keywords: Schnorr Signcryption, Cryptosystem, DSP,Secure wireless system 1. Introduction Over the last few years, mobile wireless communication has rapidly emerged throughout the world and had a very rapid increase in the number of subscribers. As an extension of mobile technology, users are able to send and receive data across the world using the mobile communication networks [5]. Due to the increasing number of users in mobile wireless communication networks, there is a growing demand of security deployment. Data security is critical for most businesses and even for some individual users such as, client information, payment information, personal files, and bank account details. This type of information can be replaced and potentially damaged if it falls into the wrong hands ( by losing it to hackers). Malware infections, exploits from corporate espionage, or any other malicious activity coul have catastrophic consequences. Thus, we have to identify areas of vulnerability and develop strategies for securing important data and information systems. Data security needs an overall strategy and risk assessment. This allow us to identify the risk that we might face. Since data could be compromised in many ways, the best security measure against misuse or theft involves, is to identify a combination of technical measures and physical security. Users should implement clearly defined polices into their infrastructure to protect data communication availability, integrity and confidentiality [11]. Third parties should not be able to identify or track mobile terminals, also should not be able to perform traffic analysis [8]. Authenticated encryption algorithm, should be applied on the transferred data in order to achieve data confidentiality, data authenticity and protection aginest reply attack.