A Review On Securing Distributed Systems Using Symmetric Key Cryptography
نویسندگان
چکیده
This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems. Businesses around the world as well as research and other such areas rely heavily on distributed systems these days. Hence, security is also a major concern due to the openness of the system. Out of the various available security measures, we, in this paper, concentrate in general on the symmetric key cryptographic technique. We review two widely used and popular symmetric key cryptographic algorithms, viz. DES and AES. These two algorithms are evaluated on the parameters such as key size, block size, number of iterations, etc.
منابع مشابه
Review of MANETS Using Distributed Public-key Cryptography
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Publ...
متن کاملIssues and Challenges in Symmetric Key based Cryptographic Algorithm for Videos and Images
Modern era is fully dependent on internet communication. Through internet we can transfer data anywhere in the world. Through these various activities can be done such as online bill payment, shopping. The network is currently used for carrying personal information as well as financial data. Thus, it is necessary to secure the network, in order that unauthorized person cannot access personal in...
متن کاملTree Based Protocol for Key Management in Wireless Sensor Networks
Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a s...
متن کاملA Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The proposed solution relies solely on symmetric cryptography and therefore is applicable for highly resource-limited devices. In order to avoid a single point of trust, no master device or base station is used. We achiev...
متن کاملSupporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip
The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper, we propose a pure hardware implementation of a key agreement protocol, which uses the elliptic curve Diffie-Hellmann and digital signature algorithms and enables two...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1303.0351 شماره
صفحات -
تاریخ انتشار 2012