On optimal cryptographic key derivation

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Extraction and Key Derivation: The HKDF Scheme

In spite of the central role of key derivation functions (KDF) in applied cryptography, there has been little formal work addressing the design and analysis of general multi-purpose KDFs. In practice, most KDFs (including those widely standardized) follow ad-hoc approaches that treat cryptographic hash functions as perfectly random functions. In this paper we close some gaps between theory and ...

متن کامل

Personalised cryptographic key generation based on FaceHashing

Among the various computer security techniques practice today, cryptography has been identified as one of the most important solutions in the integrated digital security system. Cryptographic techniques such as encryption can provide very long passwords that are not required to be remembered but are in turn protected by simple password, hence defecting their purpose. In this paper, we proposed ...

متن کامل

Faster Cryptographic Key Exchange on Hyperelliptic Curves

We present a new approach to key exchange based on divisor arithmetic for the real model of a hyperelliptic curve over a finite field, as opposed to the imaginary representation that is normally used for cryptographic applications. Using generic divisor arithmetic, our protocol is almost fifteen percent faster than conventional key exchange using hyperelliptic curves, with the most significant ...

متن کامل

Comments on a cryptographic key assignment scheme

In this paper we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users. keywords: Key assignment, Access control.

متن کامل

Cryptographic Key Management Concepts

83.2 Key Management Myths .................................................... 1070 Myth 1: A Key Qualifies as “Randomly Generated” If One or More Persons Create the Key Components from Their Imagination † Myth 2: An “Authorized” Person Can Create or Enter Cryptographic Keys without Compromising a Key † Myth 3: Requiring a Second Person to Supervise or Observe the Key Entry Process Is Dual Cont...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2013

ISSN: 0304-3975

DOI: 10.1016/j.tcs.2013.04.010