Twitter

Follow palashbiswaskl on Twitter
Follow palashbiswaskl on Twitter

Monday, October 25, 2010

ISI SCIENTIST DEVELOPS CUTTING EDGE ENCRYPTION TECHNOLOGY



---------- Forwarded message ----------
From: Press Information Bureau Ministry of I&B <pib.kolkata@gmail.com>
Date: Mon, Oct 25, 2010 at 2:38 PM
Subject: Local Release.........1



Press Information Bureau

Government of India

* * * * * *

ISI SCIENTIST DEVELOPS CUTTING EDGE ENCRYPTION TECHNOLOGY

Kolkata, October 25, 2010

 

Professor Palash Sarkar of Indian Statistical Institute (ISI), an internationally acknowledged expert in cryptology has obtained the internationally best known method for one of the major steps in securing communication over the Internet. The research has been published in the August 2010 issue of the world's leading journal in the mathematics of communication-the IEEE Transaction on Information Theory. Technically the step is called a mode of operation of a block cipher for achieving Authenticated Encryption with Associated Data (AEAD).  This has been informed by the ISI in a press release in Kolkata.

 

The ISI is an internationally recognized center for research in cryptology. Prof. Bimal K. Roy has led a group of scientists over the last ten years for research on this subject. This research is a fall out of that vibrant intellectual environment.

 

Ad-hoc methods for AEAD were being used for quite a long time. Efficient methods have been proposed by different groups of researchers from leading US research labs and universities. All efficient methods prior to Professor Sarkar's work are covered by intellectual property claims. This has led the US National Institute of Standards and Technology to declare as US standard, a relatively inefficient method developed by Cisco.

 

Professor Sarkar has developed a new theory to tackle the problem from a more practical point of view. The work provides speed improvements over past methods. More importantly, it provides a customizable feature using which any potential user can uniquely reconfigure the algorithm without losing on the benefits of achieving the best possible speed and the assurance of provable security. This will immensely benefit the defence establishments who do not use publicly known cryptographic algorithms for their use. On the other hand, since the algorithm is free from patent claims, it can be adapted for use as international standards.

 

sc/dk/kol/14:34 hrs.

 




--
Palash Biswas
Pl Read:
http://nandigramunited-banga.blogspot.com/

No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...

Welcome

Website counter

Followers

Blog Archive

Contributors