نتایج جستجو برای: symmetric key management

تعداد نتایج: 1422366  

2017
Eleanor Birrell

So far, you have seen an overview of the basic cryptographic protocols that are used to secure a variety of modern systems. In 5430, you talked about symmetric encryption (e.g., AES), asymmetric encryption (e.g., RSA, El Gamal), hybrid encryption, MACs, digital signatures, and key agreement protocols. This means you are now familiar with many of the essential cryptographic building blocks that ...

2013
Ravi Kishore Kodali Sushant K. Chougule

Wireless sensor network promises ubiquitous data collection and processing for variety of commercial, healthcare and military applications. Practical realization of WSN applications is possible only after assuring network security. Cryptographic key distribution is an important phase in network security which establishes initial trust in the network. Security protocol implementation in WSN is l...

Journal: :Int. Arab J. Inf. Technol. 2016
Subashri Thangavelu Vaidehi Vijaykumar

Security in Voice over Internet Protocol (VoIP) network has turned to be the most challenging issue in recent years. VoIP packets are easy to eavesdrop on by hackers due to the use of Diffie-Hellman (DH) algorithm for single common key exchange between two end-users. As a result the confidentiality of voice data turns to be a challenging issue. There is a need for strong key management algorith...

2017
Jasmeet Kaur Usvir Kaur

Cloud computing provide different services to user. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. To solve the problem of Key management, Key Sharing various schemes have been proposed. The pape...

Journal: :CoRR 2014
Omer K. Jasim Mohammad Safia Abbas El-Sayed M. El-Horbaty Abdel-Badeeh M. Salem

With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This pape...

Journal: :IJCNIS 2017
Venifa Mini G K. S. Angel Viji

A disgusting problem in public cloud is to securely share data based on fine grained access control policies and unauthorized key management. Existing approaches to encrypt policies and data with different keys based on public key cryptosystem are Attribute Based Encryption and proxy reencryption. The weakness behind approaches is: It cannot efficiently handle policy changes and also problem in...

Journal: :I. J. Network Security 2015
Vankamamidi Srinivasa Naresh Nistala V. E. S. Murthy

The aim of this paper is to propose an efficient and simpler Contributory Group Key Agreement protocol (CGKA) based on Elliptic Curve Diffie Hellman (ECDH). In this CGKA protocol, a member acts as a group controller (GC) and forms two-party groups with remaining group members and generates an ECDH-style shared key per each two-party group. It then combines these keys into a single group key and...

2006
Paul Beame

One way to use Diffie-Hellman’s 1976 secret key exchange protocol is to create a key to be used in later rounds for symmetric encryption. This requires multiple rounds of communication. Rivest, Shamir, and Adleman in 1978 developed the one round communication scheme discussed earlier. Namely, in order for Bob to receive messages Bob produces an integer N = pq where p and q are primes of equal l...

2015
R. Sharmila V. Vijayalakshmi

Many key management schemes have been proposed in systematically deployed Wireless Sensor Networks (WSNs).The sensor nodes are equipped with inadequate battery power, low memory, limited computation and communication range. Energy efficient secure routing is major issue in wireless sensor networks. In this paper, the hybrid key management scheme is proposed by combining public key cryptography ...

2013
Inderpreet Kaur

In recent years, Mobile Ad-hoc Networks have received an immense attention in both industry and academia as they provide dynamic networking services. Such networks are rapidly deployable in the future, so secure wireless environment will be obligatory. In mobile ad hoc networks, due to unreliable wireless media, lack of fixed infrastructure and host mobility, providing secure communications is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید