Quadratic Residue Integrity Standard

Vinu V Das *
Researcher and Lecturer in the Department of Computer Sience and Engineering, MES College of Engineering, Kuttippurom, Kerala, India
Periodicity:April - June'2007
DOI : https://doi.org/10.26634/jse.1.4.757

Abstract

This paper presents a new and efficient algorithm that provides a high degree of integrity for the packets, which are encrypted using Quadratic Residue Cryptography. This standard, evolved from the base of Quadratic Residuosity Problem, provides security for the bit in the information super highway. Even though a number of Quadratic Residue encryption techniques are available, there is no algorithm for ensuring its integrity. Quadratic Residue Integrity Standard will nullify the same.

Keywords

Quadratic Cryptography, Integrity Algorithms, Residuosity, Quadratic Residue Encryption, Quadratic Residue Problem

How to Cite this Article?

Vinu V Das (2007). Quadratic Residue Integrity Standard. i-manager’s Journal on Software Engineering, 1(4), 81-84. https://doi.org/10.26634/jse.1.4.757

References

[I ]. N. Koblifz, "Algebraic Aspects of Cryptography: Algorithms and Computation in Mathematics", Springer-4
[2]. T. ElGamaI, "A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms", IEEE Transactions on Information Theory, Vol, 31, pp, 472-496, 1985
[3]. S. Goldwasser and S. Micali, "Probabilistic Encryption", Journal of Computer and System Science, Vol. 28, pp. 270-299, 198
[4]. Richard E. Smith, "Internet Cryptography", Addison- Wesley, 1999
[5]. S. Singh, "The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography", Fourth Estate, Landon, 1999
[6]. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Application to Cryptography", Proceedings of the 2Ofh Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, pp, 55-60, 1979
[7]. H. Wiener, "Cryptanalysls of Short RSA Secret Exponents" , IEEE Transactions on information Theory, Vol. 36, pp, 553-558, 1990
[8]. W. Diffie and E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, Vol. 22, pp. 644-654, 1976
[9]. Ravi Kalakofa and Andrew 8. Whinston, "Frontiers of Electronic Commerce" , Addison-Wesley, I 999
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.