Cryptology is the study of "hiding" information from third parties and focus on two fields: crytopgraphy and cryptoanalysis. The former field deals with the actual making of codes to encrypt and decrypt information while the latter focuses on breaking these codes. In symmetric encryption, private or "secret" keys are used to encrypt and decrypt messages, where as in asymmetric encryption, a public key is used to encrypt a message and a private key is used to decrypt it.
AMSC is a symmetric cryptographic method that uses modular arithmetic to encrypt several messages into one ciphertext. This ciphertext can be sent out to multiple parties and each party can decrypt the cipher text with their own private key to retrieve their own message. Andrew and Matthew's goal is to turn AMSC into an asymmetric algorithm in order to make it more secure.
Yakeen and Kevin would like to go further and find specific applications of the AMSC algorithm in the field of vehicular ad-hoc networks (VANETs). VANETs have been a hot topic in the research world for quite some years now because they can ensure a safer driving experience. However, because messages are being sent back and forth in a VANET environment, security becomes an issue. In this way, we want to see if we can use the AMSC algorithm to come up with a protocol to make VANETs more secure.
AMSC is a symmetric cryptographic method that uses modular arithmetic to encrypt several messages into one ciphertext. This ciphertext can be sent out to multiple parties and each party can decrypt the cipher text with their own private key to retrieve their own message. Andrew and Matthew's goal is to turn AMSC into an asymmetric algorithm in order to make it more secure.
Yakeen and Kevin would like to go further and find specific applications of the AMSC algorithm in the field of vehicular ad-hoc networks (VANETs). VANETs have been a hot topic in the research world for quite some years now because they can ensure a safer driving experience. However, because messages are being sent back and forth in a VANET environment, security becomes an issue. In this way, we want to see if we can use the AMSC algorithm to come up with a protocol to make VANETs more secure.