Application of Identity-Based Cryptography to E-mail Security

SHEKH FAISAL, ABDUL LATIP (2003) Application of Identity-Based Cryptography to E-mail Security. Masters thesis, University of London.

[img] PDF (24 Pages)
Application_of_Identity-Based_Cryptography_to_E-mail_Security.pdf - Submitted Version
Restricted to Registered users only

Download (2MB)

Abstract

Cryptography is a very important element in information security. It is used to deliver the three most important aspects of security namely confidentiality, integrity and authenticity. Whether we believe it or not, cryptography has been using nearly everywhere ranging from e-mail systems, computer systems and networks, mobile phones, e-commerce, military, smm1 cards etc. Hence, cryptography is considered as the core Of information security. Generally, cryptographic algorithms could be divided into two categories either symmetric key cryptography or public (asymmetric) key cryptography. The choice between these two types of cryptographic algorithms will depend on the application that they are to be used. The symmetric key cryptography is of choice when the speed of the algorithm is in concern since it has the ability to encipher messages much faster than the public key cryptography. Typically, symmetric key cryptography is used to encrypt long messages due to its speed capability. However, the public key cryptography will be chosen when the application on which it is to be used is more concern about the authentication and non-repudiation of messages. Since the speed of the algorithm is much slower, it is normally used to encrypt session keys that are much shorter compared to the actual message to be sent. Both authentication and non-repudiation services could only be provided when digital certificates and digital signatures are in place. These digital certificates, digital signatures, cryptographic algorithms and other complementary properties are known as a public key infrastructure (PKI). Since the past few years, much research has been done on a special area of PKI called identity-based cryptography. The aim is to simplify the current infrastructure in PKI by avoiding the need of digital certificates and the certification authorities by using a user's identity as the public key. Most of the research seems to aim e-mail security as the immediate implementation of identity-based cryptography. This is probably to show the flexibility of the identity-based cryptography comparing to traditional PKI since both sender and receiver of a mes sage don't have to rely on each other (since they can work offline) or the certification authority in order to send or read a message.

Item Type: Thesis (Masters)
Uncontrolled Keywords: Public key cryptography, Computer security, Cryptography
Subjects: Q Science > QA Mathematics
Q Science > QA Mathematics > QA76 Computer software
Divisions: Library > Tesis > FTMK
Depositing User: Nor Aini Md. Jali
Date Deposited: 15 Sep 2014 14:51
Last Modified: 28 May 2015 04:30
URI: http://eprints.utem.edu.my/id/eprint/13168
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item