Deniable Encryption based on Standard RSA with OAEP

被引:0
|
作者
Yajam, Habib Allah [1 ]
Ahmadabadi, Younes Karimi [1 ]
Akhaee, Mohammadali [1 ]
机构
[1] Univ Tehran, Sch Elect & Comp Engn, Tehran, Iran
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There are various methods of anti-forensics many of which are simple and robust, however, some advanced techniques such as Deniable Encryption not only are powerful but also proven to be unbreakable in the mathematical sense. Thus, studying them has a crucial role in the science of digital forensics research. In this research, we propose a new technique for deniable encryption based on RSA with OAEP. The technique is motivated by a work of Klonowski et al. and has security property of sender-deniability without any required pre-shared keys. Moreover, since the proposed method is based on widely-used RSA encryption the deniable encryption raises much less suspicion. Thereafter, by presenting implementation results, we show the applicability of our scheme.
引用
收藏
页码:84 / 88
页数:5
相关论文
共 50 条
  • [1] On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures
    Schuldt, Jacob C. N.
    Shinagawa, Kazumasa
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 241 - 252
  • [2] Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
    Mazlisham, Muhammad Hafiz
    Adnan, Syed Farid Syed
    Isa, Mohd Anuar Mat
    Mahad, Zahari
    Asbullah, Muhammad Asyraf
    IEEE 10TH SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE 2020), 2020, : 292 - 296
  • [3] RSA-OAEP Is Secure under the RSA Assumption
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    David Pointcheval
    Jacques Stern
    Journal of Cryptology, 2004, 17 : 81 - 104
  • [4] Bi-deniable Public-Encryption Protocols Based on Standard PKI
    Moldovyan, Nikolay
    Berezin, Andrey
    Kornienko, Anatoly
    Moldovyan, Alexander
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 212 - 219
  • [5] RSA-OAEP is secure under the RSA assumption
    Fujisaki, E
    Okamoto, T
    Pointcheval, D
    Stern, J
    JOURNAL OF CRYPTOLOGY, 2004, 17 (02) : 81 - 104
  • [6] A novel key exchange protocol based on RSA-OAEP
    Liu, Jie
    Li, Jianhua
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1641 - 1643
  • [7] Strengthening Security of RSA-OAEP
    Boldyreva, Alexandra
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 399 - 413
  • [8] Deniable encryption
    Canetti, R
    Dwork, C
    Naor, M
    Ostrovsky, R
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 90 - 104
  • [9] RSA-OAEP is RKA Secure
    Jia, Dingding
    Li, Bao
    Lu, Xianhui
    Liu, Yamin
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 270 - 281
  • [10] A Rational Secret-Sharing Scheme Based on RSA-OAEP
    Isshiki, Toshiyuki
    Wada, Koichiro
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 42 - 49