Analysis Of Homomorphic Encryption Has Been An Open Problem For Many Years

Analysis Of Homomorphic Encryption Has Been An Open Problem For Many Years

Length: 1328 words (3.8 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

Homomorphic encryption has been an open problem for many years and has been a target of study in the field of public key cryptosystems. We propose a somewhat asymmetric homomorphic encryption which will provide a high security and data integrity.

subsection{Encryption today: how safe is it really? (DF Hw2)}
Security and Encryption are really important subjects in today 's technologies. Every time we use our phones and smart devices we are exposing ourselves to different types of attacks. When we check our email, make a purchase online, have you ever ask yourself how is your private information kept secure.
Our information is getting secured by attackers by using cryptographic algorithms, which basically get the information typed by the user (plain text) and modify the message in a way that cant be read by anyone else but the legitimate recipient.
Security has been a main concern for years the first cryptographic methods actually go back to the time of ancient Greece. Indeed, the word “cryptography” is a combination of the Greek words for “secret” and “writing”.
For example even the Spartans used a system where they wrapped a piece of papyrus around a staff of a certain girth, they will write the message down the length of the staff. When the papyrus was unravelled, the message was jumbled until it reached its destination and was wrapped around another staff of the correct circumference to be able to see the correct message.
A lot has change since those days modern technology has made it possible and practical to use far more complex encryption techniques, using algorithms that are harder to break.

This article is a great example of an overview of Public Key Encryption, which is one of the fundamental building blocks of SSL. As...

... middle of paper ...

The old problem with fully homomorphic encryption was solved thanks to the work of Gentry based on ideals lattices. However Gentry’s FHE was not efficient in many applications, because the computational time and ciphertext size were high-degree polynomials. Optimizations were developed by Stehle and Steinfeld, reducing complexity from Big O p6 to Big O p3.5. Even though Gentry’s wasn’t as effective he gave a construction framework that allowed a FH scheme to be transformed, by applying regularly the bootstrapping theorem from a “somewhat” homomorphic scheme, which could merely evaluate “low-degree” polynomials homomorphically. In this paper a lower Big O was achieved by applying "squash 63 decryption technique and then ciphertext refresh procedure our somewhat scheme can be easily transformed into a fully homomorphic scheme that may be practical to cloud computing.”

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Ensuring Data Security Using Homomorphic Encryption in Cloud Computing Essay

- Homomorphic Encryption allows access to highly scalable, inexpensive, on-demand computing resources that can execute the code and store the data that are provided to them. This aspect, known as data outsourced computation is very attractive, as it alleviates most of the burden on IT services from the consumer. Nevertheless, the adoption of data outsourced computation by business has a major obstacle, since the data owner does not want to allow the un trusted cloud provider to have access to the data being outsourced....   [tags: data outsourced computation,IT services,RSA]

Strong Essays
1063 words (3 pages)

Symmetric Encryption Is The Oldest And Best Known Technique Essay

- Symmetric encryption is the oldest and best-known technique. A secret key uses a number, a word, or just a string of random letters, and is applied to the text of a message to alter the content in a specific way. This might be as simple as shifting each letter by a number of places in the alphabet. This simple method was used by Julius Caesar. When both the sender and the recipient know the secret key, they can encrypt and decrypt all messages that use this key. To better illustrate symmetric encryption follow this simple example: John and Steve have a need to share information that is secret or sensitive in some way....   [tags: Cryptography, Advanced Encryption Standard]

Strong Essays
733 words (2.1 pages)

How Encryption Is Important Than Most Important? Essay

- Encryption Ever since human beings have attempted to send an important message from one point, or person, to another, the need for encryption has been around. This has never been more important than in today’s highly technical society. With the advent of the internet, cloud computing, smart phones, on-line shopping, on-line banking and the entire world of technology that we live in today encryption has never been more important than it is today. Whether you are encrypting your personal computer or fortifying your business networks, if you take certain precautions, you can better protect that which is most important to you or your business....   [tags: Cryptography, Encryption, Pretty Good Privacy]

Strong Essays
1620 words (4.6 pages)

Selective Encryption Algorithm for Highly Confidential Real Time Video Applications

- ... Hence, the encryption of intra-prediction mode also has the threat of brute-force attack. So, the values of level_suffix with sign bits are encrypted with higher length of bitstream (6 bits for luma and 4 bits for chroma), to reduce the threat of brute-force attack. However, this affects the compression bandwidth. We have also analyzed that without making motion vectors encryption, we can’t get temporal redundancy. Motion vector encryptions are proposed by many authors [4-9]. However, analysis shown in this paper said that 45-50% of motion vectors for each frame are not encrypted....   [tags: selective encryption, security]

Strong Essays
734 words (2.1 pages)

How Important is the Encryption Debate? Essay

- How Important is the Encryption Debate. The encryption debate is intense and heated in certain circles, but is of no major concern to the vast majority of people in the United States. Most of the people I talk to regard its regulation to be of little consequence, or too complicated to take a position on. Indeed, the prevailing opinion I encounter is that is an area best left to the experts who understand its capabilities, uses and dangers. While no one really trusts the government, in the face of the sundry bogeymen evoked by law enforcement agents as a rationale for protecting the people, most people are hard pressed to stand up and speak of the inviolability of their privacy rights....   [tags: Encryption Market Essays]

Strong Essays
1109 words (3.2 pages)

Essay on Annotated Bibliography : History Of Encryption

- History of encryption: Encryption is said to be as long as civilization. In fact, writing has been considered to be one of the first forms of encryption, as only the rich and educated civilians could read and understand the text. Moreover, looking at more recent times, the Navajo windtalkers was a language used by the American military in the second world war to communicate. This particular language was used as it so intricate that only American natives could make any sense out of it hence disadvantaging the enemy [B2]....   [tags: Cryptography, Public-key cryptography, Encryption]

Strong Essays
1521 words (4.3 pages)

Essay about Attribute Based Encryption Access Policy

- In Attribute based encryption access Policy of algorithm is associated with Private Key of user where leaf nodes are attributes coming from fuzzy identity. Based on the attributes possessed by the user the access to the asset will be granted. The attribute based key policy encryption setup algorithm generates Alice’s master key. Alice’s identity is being decided by key policy which in turn is being decided from identity. Key Policy algorithm generates private key for Alice. Cherishma encrypt message M with set of attributes k....   [tags: Cryptography, Encryption, Key, Cipher]

Strong Essays
1051 words (3 pages)

Research Project Encryption Essay

- Research Project Encryption Should the US government limit the strength of encryption products to eavesdrop on people’s everyday life. I remember exchanging secret letters with my friends in Japan as a child. We developed a code in which each letter of the Japanese alphabet was replaced by the one that follows it. For example, if we had used English, "Z" would have been replaced by "A". Each of us had the key to understanding this code but outsiders didn’t, so we didn’t have to worry if one of our brothers intercepted our letters....   [tags: Encryption Writing Code Privacy Essays]

Free Essays
1896 words (5.4 pages)

What is Encryption? Essay

- What is encryption. Encryption is used all around us and we depend on it so very much without even noticing it. Cryptography (encryption) is the computer science field of hiding information. It tries to hide (encrypt) the information so that if anyone who isn’t supposed to get access to the hidden, encrypted, data cannot rebuild, decrypt, the message to get the original information. The encryption engine will encrypt it in such a way that you can’t recognise the original message. With the right key, that was decided on before encrypting the data and the right decryption engine, which would be the inverse method of the method that was used to encrypt the message the original message can be re...   [tags: internet security, cryptography]

Strong Essays
1146 words (3.3 pages)

Data Encryption Essay

- Missing Chart Encryption Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you know what encryption means and the second question I asked was have you ever heard of anybody using encryption....   [tags: Data Security]

Strong Essays
1027 words (2.9 pages)