cryptosystem


Also found in: Thesaurus, Medical, Encyclopedia, Wikipedia.

cryptosystem

The associated items of cryptomaterial that are used as a unit and provide a single means of encryption and decryption. See also cipher; code; decrypt; encipher.
References in periodicals archive ?
This invention is an innovative step toward building a resilient and secure cryptosystem while maintaining security and usability requirements.
This research project aims to develop a framework for a secure biometric cryptosystem by protecting biometric templates derived from the fusion of palm prints and palm veins to satisfy four biometric cryptosystem and template security criteria: Security, diversity, revocability, and accuracy of performance.
We recall some remarkable results in cryptanalysing on low private exponent RSA in Section 2 after recalling the original RSA cryptosystem.
2 Probabilistic public-key cryptosystem that supports rerandomization and threshold decryption
Goto, A Public-key Cryptosystem using Algebraic Surfaces: Extended Abstract, PQCrypto Workshop Record, 2006.
This characteristic creates the biggest critical act in any cryptosystem that uses symmetric algorithms which is distribution of the shared secret between the two parties like DES algorithms [8][9].
It describe the elgamal public-key cryptosystem and the diffehellman key exchange and the then extends these cryptosystem over the domain of gaussian integers.
Taher ElGamal [4, 11] described a modular exponentiation based cryptosystem on the multiplicative cyclic group [Z.
The RSA cryptosystem - introduced by Rivest, Shamir, and Adlement in 1977 - relies for its security on the difficulty of working out the factors dividing large integers.
We discuss some characteristics of an image cryptosystem and research issues of an image cryptosystem in Sections 3 and 4 respectively.
The companies said they developed an implementation technology of an elliptic curve cryptosystem, which features more greatly enhanced security functions than the current systems and is expected to be a standard for e-governance and e-commerce in Japan in the future.
In practice, one can call a cryptosystem "computationally secure," if the best known method of breaking the system requires an unreasonably large amount of computer time.