Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/1832
Title: The Application of Hybrid Cryptographic Algorithms for Cyber Warfare and Terrorism in a Nation Defence
Authors: Waziri, Victor Onomza
Alhassan, J. K.
Ismaila, Idris
Keywords: : Hybrid Cryptosystem, Random Oracle, Adversary, Indistinguishability, Symmetric key, Hybrid encryption, Non-adaptive Chosen Ciphertext Attack, Cyberterrorism, Cybercrime
Issue Date: Mar-2015
Publisher: International Journal of Advanced Research in Computer Science and Software
Citation: http://ijarcsse.com/Before_August_2017/index.php
Abstract: In this paper, we present the hybrid cryptographic scheme and its application in safeguarding the dissemination of both public and commercial data in static state or in transaction, which also expedites faster computational processes. The application is derivable from the asymmetric and symmetric hybrid encryption schemes. The asymmetric schemes are number-theoretic operations which are slower than the symmetric encryption schemes that always uses block enciphers. Often, it is the desire in most encryption schemes to encrypt long messages, but with the asymmetric key only; this could pose time depletion due to its slowness in process execution. To achieve accelerated coding preeminence, it is always appropriate to use the two well-known encryptions paradigms-the Public Key Infrastructure (PKI) and the Private Key Infrastructure (Secret Key). In practice, an encoder will first encrypt her private key using therecipient’s publickey, and then sends her encrypted key embeddedin her encrypted message that is encrypted withherpublic key. The recipient upon receiving the contents of the messagewill decrypt thetransmitted encryptedkey using his private key since this was encrypted with his public key;then with the decrypted private key from the sender,he decrypts the message of the sender since the sender uses her public keyto encipher the message. This process is called hybrid encryption scheme. Our proposal is to scrutinize the functionality of this encryption scheme and then apply it on our discourse of Cyberspace terrorism warfare for national security top secret advantage. We present an ingenious algorithmic cryptosystem based on encryption and decryption Oracles for the construct.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/1832
ISSN: 2277128X
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
The application of Hybrid crypto.pdf50.63 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.