A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Computer networks are ever-changing technologies that embodied secure communication protocol offerings security towards the digital communications. Secure Communication most often uses cryptographic primitives as the methods or techniques to protect the confidentiality of data being communicated. Th...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/40021/1/40021.pdf https://ir.uitm.edu.my/id/eprint/40021/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.40021 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.400212022-03-08T03:20:23Z https://ir.uitm.edu.my/id/eprint/40021/ A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata Mohamad Hata, Mohsen Engineering mathematics. Engineering analysis Computer networks are ever-changing technologies that embodied secure communication protocol offerings security towards the digital communications. Secure Communication most often uses cryptographic primitives as the methods or techniques to protect the confidentiality of data being communicated. The main components of cryptography are the algorithm and the key management. However, an adversary could use coercion method where both components can no longer be reliable. In a Public Key Infrastructure network, Deniable Encryption techniques have been introduced to achieve incoercible communication. This technique uses Fake Keys and/or Fake Messages to be presented for the Coercer in order to hide the Real Keys and/or Real Messages. For this technique to succeed, the Fake Keys must be indistinguishable from the Real Keys. Past works have proposed numerous techniques of Deniable Encryption in achieving incoercible communication. However they were often easily been compromise if the coercer already suspect Deniable Encryption is applied. For achieving plausible deniability this research proposed a new protocol that embeds two layers of techniques. This new approach of constructing two layers of deniability techniques is done in a manner of defining a protocol to embed and implementing them. The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology. 2019 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/40021/1/40021.pdf ID40021 Mohamad Hata, Mohsen (2019) A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata. PhD thesis, thesis, Universiti Teknologi MARA. |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Engineering mathematics. Engineering analysis |
spellingShingle |
Engineering mathematics. Engineering analysis Mohamad Hata, Mohsen A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata |
description |
Computer networks are ever-changing technologies that embodied secure communication protocol offerings security towards the digital communications. Secure Communication most often uses cryptographic primitives as the methods or techniques to protect the confidentiality of data being communicated. The main components of cryptography are the algorithm and the key management. However, an adversary could use coercion method where both components can no longer be reliable. In a Public Key Infrastructure network, Deniable Encryption techniques have been introduced to achieve incoercible communication. This technique uses Fake Keys and/or Fake Messages to be presented for the Coercer in order to hide the Real Keys and/or Real Messages. For this technique to succeed, the Fake Keys must be indistinguishable from the Real Keys. Past works have proposed numerous techniques of Deniable Encryption in achieving incoercible communication. However they were often easily been compromise if the coercer already suspect Deniable Encryption is applied. For achieving plausible deniability this research proposed a new protocol that embeds two layers of techniques. This new approach of constructing two layers of deniability techniques is done in a manner of defining a protocol to embed and implementing them. The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology. |
format |
Thesis |
author |
Mohamad Hata, Mohsen |
author_facet |
Mohamad Hata, Mohsen |
author_sort |
Mohamad Hata, Mohsen |
title |
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata |
title_short |
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata |
title_full |
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata |
title_fullStr |
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata |
title_full_unstemmed |
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata |
title_sort |
new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / mohsen mohamad hata |
publishDate |
2019 |
url |
https://ir.uitm.edu.my/id/eprint/40021/1/40021.pdf https://ir.uitm.edu.my/id/eprint/40021/ |
_version_ |
1726795650239037440 |
score |
13.211869 |