0% found this document useful (0 votes)
128 views18 pages

Signcryption: Presented by Lijina.S.S Roll No:20 Ctaheit020 Information Technology

Signcryption is a public key cryptography technique discovered in 1997 that provides both digital signature and encryption in a single logical step. It fulfills the functions of digital signature and public key encryption with lower computational costs than traditional signature-then-encryption approaches. Signcryption provides benefits like confidentiality, authenticity, non-repudiation, forward secrecy, and past message recovery. It can be implemented using techniques like ElGamal or Schnorr signatures along with encryption schemes like DES or 3DES. While signcryption offers advantages of higher security and lower costs, it also has disadvantages like redundant resource usage for broadcasting to multiple recipients.

Uploaded by

Anju Raman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views18 pages

Signcryption: Presented by Lijina.S.S Roll No:20 Ctaheit020 Information Technology

Signcryption is a public key cryptography technique discovered in 1997 that provides both digital signature and encryption in a single logical step. It fulfills the functions of digital signature and public key encryption with lower computational costs than traditional signature-then-encryption approaches. Signcryption provides benefits like confidentiality, authenticity, non-repudiation, forward secrecy, and past message recovery. It can be implemented using techniques like ElGamal or Schnorr signatures along with encryption schemes like DES or 3DES. While signcryption offers advantages of higher security and lower costs, it also has disadvantages like redundant resource usage for broadcasting to multiple recipients.

Uploaded by

Anju Raman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 18

SIGNCRYPTION

PRESENTED BY
LIJINA.S.S
ROLL NO:20
CTAHEIT020
INFORMATION TECHNOLOGY
What is Signcryption?

• In 1997-Yuliang Zheng discovered


Signcryption.

• A new paradigm in public key cryptography.

• Fulfils both the functions of digital signature


and public key encryption.

• Lower cost than the traditional “signature


then encryption” approach.
Why Signcryption?

• Signcryption costs 58% less in average


computation time

• 70% less in message expansion


Properties
• Confidentiality
- only intended recipient able to read
contents.
• Authenticity
- only recipient can verify sender’s
identity.
• Non-repudiation
- sender cannot later deny having sent
the message.
Properties( cntd.. )
• Forward secrecy
- attacker cannot read even with the access
to the sender’s private key.
• Past recovery
- signcryption schemes allow sender to use
private key to recover original message.
Signcryption–Implementation

Can be implemented using:

- ElGamal’s Shortened Digital Signature


Scheme
- Schnorr’s Signature Scheme
- Any other digital signature schemes in
conjunction with a public key encryption
scheme like DES & 3DES

This choice would be made based on the


level of security desired by the users.
SDSS
Proposed by ElGamal
- enables one person to send a digitally signed
message to another person.

- the receiver can verify the authenticity of this


message.

- uses the private key of the sender to sign the


message.

- the receiver uses the sender’s public key to verify


the signature.
Public Key Encryption

 ciphertext = encrypt( plaintext, PK )


 plaintext = decrypt( ciphertext, PK-1 )

PK is the public key


PK-1 is the private key
Possible Applications of
Signcryption
 Signcryption in WTLS Handshake Protocol
• Existing security is by Signature-then-
Encryption or vice versa.

• User certificate is sent without encryption or


another cryptographic method

• Modified Signcryption is proposed as a


solution
Possible Applications of
Signcryption
 Unforgeable Key establishment over ATM
Network

• Transmitting encrypted keys over an ATM


network is critical.

• Existing security relies on key distribution


system.

• Modified Signcryption can solve the problem


Advantages of Signcryption
 Low computational cost
• While sending a signcrypted message,
computational costs doesn’t matter much.

 Higher Security
• Combined security schemes are complex
enough to withstand attacks.
• Hence added security.
Advantages of Signcryption
 Message Recovery

• To recover a message do one of the following:

- keeps a copy of the signed and encrypted


message as evidence of transmission.

- In addition, keep a copy of the original


message, either in clear or encrypted form.
Advantages of Signcryption
- Message Recovery

• A cryptographic algorithm provide a past recovery.

• It recovers the message from the encrypted message


using private key.

• “signature-then-encryption" does not provide past


recovery whereas signcryption does.
Disadvantages of Signcryption

Share Trader

Tower Share Trader

Bank Server

Share Trader
Disadvantages of Signcryption

 In broadcasting a single Signcrypted message to


multiple recipients.

 Redundant in terms of bandwidth consumption


and computational resource usage.
Conclusion…
 Two birds in one stone

 As complexity increases security increases.

 Effective implementation takes time.

 Research is still going on.


References
[1] Y Zheng “Digital Signcryption or how to achieve
cost-Advances in Cryptology”.
[2] (
http: //www.cs.bham.ac.uk / ~mdr /.... / ss3 / Introdu
ction
to Signcryption)
[3](
http://www.dit.ump.es/infowin/atmeurope/atmrefs.ht
ml
) ATM Reference.
[4] William Stallings “ Cryptography and Network
QUERIES

You might also like