The progressive era of computer systems
and telecommunications have call for the pervasive development of technology
that prioritizes the security, confidentiality and authenticity of information.
Hence, the identity-based cryptography has been invented and is utilized in the
world of telecommunication and information technology. Identity-based
cryptography is a kind of public-key computerized decoding among openly known
string which may represent an individual or an organization. The public string
utilized may include an electronic mail address, domain name or IP address. IBC
proficiently manages the keying material and supply an easy way of issuing a
pair of key applicable to the user‘s key information.
Cryptography is
a science and art of message encryption that transforms a message into a
covered version that cannot be intercepted and understood by unauthorized
individuals but it can be successfully received and understood by the
anticipated receiver. The procedure of encrypting and decrypting a message is
governed by keys which are commonly composed of the small information and
cryptographic algorithms[1]. It
is used in order to provide security goals among ad hoc networks especially
that the lots of threats are experienced in this communication system.
The
identity-based cryptography is dependent on the third party called the private
key generator (PKG) which can generate either a public or private keypair
(indicated by pkPKG or skPKG) and make the pkPKG accessible to the users of the
services. The given keys are known as the “master”, and there are two masters –
public key and the private key, respectively. Both the public and private keys
are interrelated in the sense that only the public key which is utilized in
encrypting messages and on the other hand it is the matching private key which
can be employed in decrypting the code. Therefore if an outsider compromises
the public key, it is them not viable to figure out the private key, hence the
message will not be decoded. The relevance of identity-based cryptography is
that it requires accurate validation of certificate since it involves multiple
node certificate instead of a chain of certificates.
The
procedure of encryption indeed ascertains the confidentiality of the message
that is sent. It is accompanied by having a digital signature that strengthens
the security goals of the message. The transmission of the message is done by
sending a message using the algorithm key and a private key as signature of the
message. Then the message along with the signature is sent to the receiver, and
the recipient will also apply the verification algorithm on the message-signature
pair[2]. This
verification algorithm needs a verification key which is the public key
provided by the signer in order to verify the documents or messages. It is
after the verification stage wherein the message will be accepted or rejected
depending on the result of the verification.
Though
the IBC had proven to be an efficient mechanism in securing and keeping safe of
confidential information, still it has its limitations that must be addressed
properly in order to ensure efficiency and proficiency of its functions. This
technology provides wireless communication that promotes more secured and
protected transmission of messages. These new schemes can be utilized as bases
for administering programs and security plans in the promulgation of confidentiality,
availability and authenticity of messages.
No comments:
Post a Comment