Acta Informatica Malaysia (AIM)

INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT

ABSTRACT

 

INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT

Journal: Acta Informatica Malaysia (AIM)
Author: Yakubu Ajiji Makeri

This is an open access article distributed under the Creative Commons Attribution License CC BY 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

Doi:10.26480/aim.01.2020.19.21

Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme. Identity-based (ID-based) cryptography is very useful because it simplifies certificate management in public-key cryptocurrency. For the design of the Integrated File Level Cryptographic Access Control (IFLCAC) system, it makes file security much easier for the end-user. This system combines the advantages of traditional file-level cryptography and full-disc cryptography systems, making it safe and easy to use. We first look at existing file cryptography systems, compare them to two, and then describe the interactions between components and components of the integrated file-level cryptographic access control system. Because its defense relies on the difficulty of discrete logarithmic and integer factor problems, it proves that his scheme is safe against favorable select-plain invasion. We show that this new ID-based encryption scheme is not secure by introducing a method to retrieve the secret master key.

Pages 19-21
Year 2020
Issue 1
Volume 4

Download