نتایج جستجو برای: symmetric cryptography

تعداد نتایج: 116835  

Journal: :I. J. Circuit Theory and Applications 2017
Vladimir Rozic Oscar Reparaz Ingrid Verbauwhede

Security features such as privacy and device authentication are required in wireless sensor networks, electronic IDs, RFID tags and many other applications. These features are provided using cryptography. Symmetric key cryptography, where the key is distributed between the communication parties prior to communication, doesn’t provide adequate solution for large scalable systems such as sensor n...

2012
G. C. Guo

Information protection has been an important part of human life from ancient time. In computer society, information security becomes more and more important for humanity and new technologies are emerging in an endless stream. Cryptography or cryptology is a technology to convert the information from readable state into nonsense, or do the contrary transformation. Information transmission and st...

1999
Joel Brawley Shuhong Gao

Chapter 8 has described several of the classical models of cryptography in which the decryption key was the same as or easily derivable from the encryption key. This meant that the corresponding encryption and decryption algorithms were closely related in the sense that one could be easily deduced from the other. Such cryptographic systems are called symmetric-key or conventional systems, and t...

2004
Cariappa Mallanda Shivakumar Basavaraju Archit Kulshrestha Rajgopal Kannan Arjan Durresi S. Sitharama Iyengar

Present research on wireless sensor networks has focused on routing and security independently. In this paper, we present a Secure, Cluster-based, Energy Aware Routing (SCEAR) scheme that provides both a hierarchal energy aware routing and a secure environment for communication. In our approach, the network is divided into clusters with a cluster-head that aggregates the information and securel...

Journal: :IJSN 2006
Haodong Wang Bo Sheng Qun Li

Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right due to the access restriction implicated by the data security and confidentiality. Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfil the requirement, public-key cr...

2015
Chandan Kumar Sandip Dutta Soubhik Chakraborty

“Music can be used as a communicable language”. Musical symbols and musical notes have been used as codes and ciphers from early days. The art of encrypting messages using music is termed as Musical cryptography and it uses predefined set of notes and set of rules for composing musical pieces which in turn are musical cryptograms. Traditional algorithms applied to musical cryptography used simp...

2004
George Davida René Peralta

We show that any encryption/decryption system can be converted to an algorithm which uses roughly three machine operations per bit. We prove that our technique yields an encryption/decryption system which is as secure as the original system provided the plaintext has full-entropy. We then show how to remove the full-entropy assumption. Our techniques speed up software implementations of RSA by ...

2008
Seny Kamara Jonathan Katz

Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that are generated uniformly at random and independently of anything else. This leaves open the possibility of attacks in case the random coins are poorly generated (e.g., using a faulty random number generator), or are un...

Journal: :IJSN 2008
Panayiotis Kotzanikolaou Dimitrios D. Vergados Giannis Stergiou Emmanouil Magkos

Research on key establishment for Distributed Sensor Networks (DSNs) focuses on lightweight protocols that are feasible for the sensor nodes, which by default have restricted capabilities. Although the most efficient protocols for key establishment are based on symmetric key encryption, these protocols are unable to provide adequate security against attacks, such as node impersonation and fake ...

2006
Aziz Mohaisen DaeHun Nyang

Wireless Sensor Network (WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید