Enhancing Key Management and Public Key Cryptography Integration: A Novel Approach with Matrices and Digital Signatures
Main Article Content
Abstract
The concept of securing messages through cryptography has a long history. Indeed, Julius Caesar is credited with creating one of the earliest cryptographic systems to send military messages to his generals. In this paper, we propose a practical and Static key management scheme based on the public key system and a set of matrices with canonical matrix multiplication that provides advanced secure feature for smart card along with other authentication schemes. Throughout history, however, there has been one central problem limiting widespread use of cryptography problem is key management. The term key management refers to the secure administration of keys to provide them to users where and when they are required. A major advance in cryptography occurred with the invention of public-key cryptography. The primary feature of public-key cryptography is that it removes themed to use the same key for encryption and decryption. The public portion of the key pair can be distributed in a public manner without compromising the private portion, which must be kept secret by its owner. As a step towards the systematic application of authenticated public key cryptography, this article proposes an extension to the Java framework to integrate public key cryptography with the implementation of Digital signatures. The process of digitally signing starts by taking a mathematical summary (called a hash code) of the message. This hash code is a uniquely identifying digital Fingerprint of the message. If even a single bit of the message changes, the hash code will dramatically change. The next step in creating a digital signature is to sign the hash code with your private key. This signed hash code is then appended to the message. The recipient of your message can verify the hash code sent by you, using your public key. Public-key encryption is used to solve the problem of delivering the symmetric encryption key in a secure manner. To do so, you would encrypt the symmetric key using the receiver‟s public key. Since only the receiver has the corresponding private key, only the receiver will be able to recover the symmetric key and decrypt the message. It is our belief that such an extension would help speed up the Public Key Cryptography.