Information Assurance Protocols: Efficiency Analysis and Implementation for Secure Communication

نویسنده

  • Boris S. Verkhovsky
چکیده

Two major issues are considered in this paper: security of communication and reliability of connection. The paper demonstrates how to interlink both the security requirement and communication assurance into one algorithmic procedure. Several reliability protocols are described and their characteristics (probabilities of failure, bandwidth requirement per block of transmitted ciphertext and complexity of recovery) are analyzed and compared.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Efficiency of Information Management and Analysis for Industrial Entrepreneurship

Information Management and Analysis (IMA) implies the single data and knowledge base of the business organization whose algorithm and software complex is designed to solve functional problems of operating and dispatch management, marketing, financial arrangements, accounting, strategic planning and organizing e-document flow between the sources and users of information. The “information – commu...

متن کامل

Secure Implementation of Cryptographic Protocols: A Case Study of Mutual Distrust

Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance provided by security-typed languages when implementing cryptographic protocols. Our results are ba...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009