Advantages And Disadvantages Of Cryptography

Words: 3176
Pages: 13

I. INTRODUCTION
Paper media has been drastically replaced by electronic media in the last 30 years. As the use of electronic media is increasing for exchange of information, so is the risk of the act of eavesdropping. Today, an eavesdropper has an increased amount and variety of information available, making the act of eavesdropping much easier. This has led to an increase in interest in private and commercial cryptography, taking the realm of cryptography to a whole new level.
In cryptography, the given data is processed into unintelligible form such that the original data can be retrieved using the obtained form without any loss of data in the process.
Traditional cryptography includes only one party in order to encrypt a message and a single
…show more content…
3.2. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
This construction [15] generates a distributed RSA composite by protecting its factorization’s leakage and a distributed decryption for Paillier.
Advantages:
Security against malicious software is achievable in the two party setting by this scheme.
Applications:
It can be readily used for evaluating functions of specific interests securely such as the common reference string model (CRS) in generic form or set interactions, pseudorandom functions, etc.

3.3. On Demand Self-Organized Public Key Management for Mobile Ad hoc Network
This scheme [16] exploits an on demand distance vector routing protocol infrastructure to discover a certificate chain through a web of trust. Authentication of the key management is enhanced since trust values are used with the public key certificates.
Advantages:
This scheme has low communication cost and negligible impact on network performance.
It is robust in both dynamic and static networks.
It prevents network against malicious node attacks.
…show more content…
The Private Key Generator (PKG) provides complete trust at the decryption end.
Applications:
This scheme finds its greatest use is in the file transfer service.

3.5. Multi-instance Security and Its Application to Password-Based Cryptography
Mi-security [18] is used in systems where a single instance can be compromised and a second line of defence is provided, aiming to ensure that the effort to compromise all of some large number m of instances grows linearly with m.
Advantages:
Mi security is potentially much higher than the traditional single-instance (si) security.
Applications:
It finds its application in password-based cryptography by using the process of salting.

3.6. On Dealer-free Dynamic Threshold Schemes
This scheme [19] aims at dynamically generating new secrets in the absence of the dealer. At the same time, it does the increasing or decreasing of the threshold and performs changes in the secret from time to time.
Advantages:
It overcomes the problem of almost all secret sharing schemes of being ‘one-time’, i.e. knowing of the secret and shares to all after the public secret recovery process.