TY - GEN
T1 - Hash Based Encryption Schemes Using Physically Unclonable Functions
AU - Miandaob, Dina Ghanai
AU - Booher, Duane
AU - Cambou, Bertrand
AU - Assiri, Sareh
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2022
Y1 - 2022
N2 - In recent years public key cryptography has been revolutionary developed in cryptosystems. Algorithms such as RSA, ECC and DSA are commonly used as public key cryptography in a variety of applications. The drawback of these protocols is vulnerability against quantum computing. These protocols rely on the computational hardness of finding factorization but Peter Shor has proved that quantum computing can break all the public key cryptosystems that are relying on this factorization. Hash-Based Cryptography has been subject of debates for past few decades since it is known to be resistant to quantum computer attacks and there have been some advancements over this field. But all the available methods are concentrated on the digital signature schemes. None of them have the ability to encrypt and decrypt a plain text. This paper will describe some methods that can be used as encryption and decryption of plain text using hash functions.
AB - In recent years public key cryptography has been revolutionary developed in cryptosystems. Algorithms such as RSA, ECC and DSA are commonly used as public key cryptography in a variety of applications. The drawback of these protocols is vulnerability against quantum computing. These protocols rely on the computational hardness of finding factorization but Peter Shor has proved that quantum computing can break all the public key cryptosystems that are relying on this factorization. Hash-Based Cryptography has been subject of debates for past few decades since it is known to be resistant to quantum computer attacks and there have been some advancements over this field. But all the available methods are concentrated on the digital signature schemes. None of them have the ability to encrypt and decrypt a plain text. This paper will describe some methods that can be used as encryption and decryption of plain text using hash functions.
KW - Cryptography
KW - Hash functions
KW - Physically unclonable functions
KW - Public key cryptography
UR - http://www.scopus.com/inward/record.url?scp=85135026281&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85135026281&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-10467-1_36
DO - 10.1007/978-3-031-10467-1_36
M3 - Conference contribution
AN - SCOPUS:85135026281
SN - 9783031104664
T3 - Lecture Notes in Networks and Systems
SP - 602
EP - 616
BT - Intelligent Computing - Proceedings of the 2022 Computing Conference
A2 - Arai, Kohei
PB - Springer Science and Business Media Deutschland GmbH
T2 - Computing Conference, 2022
Y2 - 14 July 2022 through 15 July 2022
ER -