Skip to main navigation Skip to search Skip to main content

Ambiguous Multi-symmetric Cryptography Proof of Concept and Experiments

  • Richard Bassous
  • , Huirong Fu
  • , Ye Zhu
  • Oakland University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper we present and describe all theexperiments and results that are done on 'Ambiguous Multi-Symmetric Cryptography' (AMSC). We compare AMSC tosymmetric and asymmetric conventional algorithms includingAES and RSA. We explain AMSC core methods in detailsalong with the experimental setup and execution. Furthermore, we design and implement a real time application as a proofof concept for AMSC. The application uses TCP/IP Multicastprotocol to send multiple messages in one cipher-text using theAMSC algorithm.
Original languageEnglish
Title of host publicationProceedings - 3rd IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2017, 3rd IEEE International Conference on High Performance and Smart Computing, HPSC 2017 and 2nd IEEE International Conference on Intelligent Data and Security, IDS 2017
EditorsMeikang Qiu
Place of Publicationusa
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages231-236
Number of pages6
ISBN (Electronic)9781509062959
DOIs
StatePublished - Jul 13 2017
Event3rd IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2017, 3rd IEEE International Conference on High Performance and Smart Computing, HPSC 2017 and 2nd IEEE International Conference on Intelligent Data and Security, IDS 2017 - Beijing, China
Duration: May 26 2017May 28 2017

Conference

Conference3rd IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2017, 3rd IEEE International Conference on High Performance and Smart Computing, HPSC 2017 and 2nd IEEE International Conference on Intelligent Data and Security, IDS 2017
Country/TerritoryChina
CityBeijing
Period05/26/1705/28/17

Keywords

  • Deniable encryption
  • Honey encryption
  • Multi encryption
  • Symmetric cryptography

Cite this