Informasi Detil Paper


Judul: Maritime Cryptology
Penulis: Intan Muchtadi Alamsyah  || email: info@mx.unpatti.ac.id
Jurnal: Prosiding FMIPA 2017 Vol. 1 no. 1 - hal. 1-4 Tahun 2017  [ Prosiding ]
Keywords:  -
Abstract: Maritime has special needs for information security, including the protection of classified information. As written in “Cryptography’s Role in Securing the Information Society”: ‘Cryptography provides important capabilities that can help deal with the vulnerabilities of electronic information. Cryptography can help to assure the integrity of data, to authenticate the identity of specific parties, to prevent individuals from plausibly denying that they have signed something, and to preserve the confidentiality of information that may have improperly come into the possession of unauthorized parties [Dam and Lin, 1996]. Elliptic Curve Cryptography (ECC) was first introduced by Neal Koblitz and Victor Miller ([Koblitz1987],[Miller1985]). They independently introduced the elliptic curve to design a public-key cryptography. Compared to other cryptography method, it has several advantages: its arithmetic operations are spesific and can not be predicted, it offers smaller key length for the same security level compared to other method and its operations have many layers and combinations. ECC relies on the security level of the discrete logarithm problem called Elliptic Curve Discrete Logarithm Problem (ECDLP) [Hankerson et al, 2004]. Previously we have conducted research related to problems of implementing elliptic curve cryptography based on composite fields [Paryasto et al, 2012] and the implementation of Elliptic Curve Integrated Encryption Scheme [Susantio and Muchtadi, 2016]. In addition, we also studied implementation of modified algorithm Pollard Rho which is basically attack on Elliptic Curve Cryptography [Muchtadi et al, 2013], [Muchtadi et al, 2014], [Muchtadi and Utomo, 2016]). For seaport security there is a need of complex system integration on linking local security seaport subsystem into a uniform global system of security based on the wire and wireless telecommunication infrastructure at the seaport territory and water area, and also onboard ships attributed to the port. However, the majority of applications do not protect confidentiality or the integrity of the message in the communication. In Elliptic Curve Cryptography, the curve 25519 is the elliptic curve that offers 128-bit security and is designed to be used in key agreement scheme elliptic curve Diffie-Hellman (ECDH). This curve is one of the fastest ECC curves and more resistant to weak random number generator. This curve has been implemented in the public domain software [Bernstein, 2006]. The curve is constructed so as to avoid a potential attack on implementation and avoid sidechannel attacks and random number generator problem. In messaging application, Curve 25519 is used for key exchange and authentication [Frosch et al, 2014]. In this research we will be develop an efficient algorithm for elliptic curve cryptography using Curve 25519 which is implemented in the security of messaging. Especially new algorithms to streamline area and time of the curve (the operations of addition and point doubling). We will learn the working mechanism of messaging applications, and simulation of unknown-keyshare attack. On the other hand, some cryptographic scheme would be insecure once quantum computing arrives [Shor1997]. Code-based cryptography, like the McEliece cryptosystem, is a candidate, as it can resist the attacks using Shor Algorithms. This cryptosystem needs a lot of background on Algebraic Coding Theory, and we have conducted many research in this area [Irwansyah et al 2016][Irwansyah et al 2016b][Irwansyah et al 2017a][Irwansyah et al 2017b]. In this research we will develop codes that possess efficient decoding algorithm to be used in code-based cryptography. We can also first get optimal codes then develop efficient decoding algorithms.
File PDF: Download fulltext PDF PDF

<<< Previous Record Next Record >>>