Fully distributed certificate authority based on polynomial over elliptic curve for MANET
نویسندگان
چکیده
منابع مشابه
Distributed certificate validation in MANET
The need for certificate management in mobile ad hoc networks (MANET) is the background for this report. A prototype implementation of a distributed certificate validation service is presented and evaluated. The proposed design is based on an overlay network of proxy nodes offering certificate validation over the XKMS protocol. The proxy nodes employ cooperative caching in order to offer certif...
متن کاملDistributed Certificate Authority in Cluster-based Ad hoc networks
The need to secure communication in ad hoc network is extremely challenging because of the dynamic nature of the network and the lack of centralized management. This makes public key cryptographic services particularly difficult to support. We propose a distributed certificate authority intended for deployment in an NTDR cluster-based architecture. We also outline procedures for maintaining thi...
متن کاملFully Parameterizable Elliptic Curve Cryptography Processor over GF(2)
In this paper we present an Elliptic Curve Point Multiplication processor over base fields GF(2), suitable for use in a wide range of commercial cryptography applications. Our design operates in a polynomial basis is fully parameterizable in the irreducible polynomial and the chosen Elliptic Curve over any base Galois Field up to a given size. High performance is achieved by use of a dedicated ...
متن کاملMiniCA: A Web-Based Certificate Authority
The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to publickey encryption technologies. Digital certificates are vital in improving access to and use of new security technologies. Granting and revocation of digital certificates is overseen ...
متن کاملHardware for Collision Search on Elliptic Curve over GF(2)
In this last decade, Elliptic Curve Cryptography (ECC) has gain increasing acceptance in the industry and the academic community and has been the subject of several standards. This interest is mainly due to the high level of security with relatively small keys provided by ECC. Indeed, no sub-exponential algorithms are known to solve the underlying hard problem, namely the Elliptic Curve Discret...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Networked and Distributed Computing
سال: 2014
ISSN: 2211-7946
DOI: 10.2991/ijndc.2014.2.2.1