Shared Cryptography with Embedded Session Key for Secret Audio
نویسندگان
چکیده
In today's scenario many audio/voice files are needed to be transmitted over internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. That leads to single point failure. To overcome this drawback shared
منابع مشابه
Shared Cryptography with Embedded
In today’s scenario many audio/voice files are needed to be transmitted over internet for various important purposes. So protection of these files is an important issue. Efficient cryptographic methods are there to protect data but every thing depends on the protection of encryption key. That leads to single point failure. To overcome this drawback shared cryptography becomes more popular. Here...
متن کاملSecure web services using two-way authentication and three-party key establishment for service delivery
With the advance of web technologies, a large quantity of transactions have been processed through web services. Service Provider needs encryption via public communication channel in order that web services can be delivered to Service Requester. Such encryptions can be realized using secure session keys. Traditional approaches which can enable such transactions are based on peer-to-peer archite...
متن کاملA N Efficient Key Exchange Protocol Based on Secret Sharing
Group key protocols are still an important research issue in the network security, generation and sharing the secret session key is the important factor during the the groupkey transfer protocols. Usually it will be taken care of KGC. KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol b...
متن کاملCRT Based Threshold Multi Secret Sharing Scheme
This paper presents a novel secret sharing system that is based on Chinese remainder theorem. This scheme deals with a concept of multiple secrets to be shared to different groups, such that each group receives shares of secret intended for it. The sharing is a threshold scheme, that is more than a fixed number of members from any particular group, will be able to reconstruct the secret and any...
متن کاملReplicating the Kuperee authentication server for increased security and reliability
The current work proposes a new scheme for the replication of authentication services in Kuperee based on a public key cryptosystem, in response to the two main shortcomings of the traditional single server solutions, namely those of low availability and high security risks. The work represents further developments in the Kuperee authentication system. The Kuperee server is presented in its bas...
متن کامل