LES: Layered Encryption Security
نویسندگان
چکیده
In this paper we discuss the concept of Layered Encryption Security(LES). We analyze the need for introducing layering in a security infrastructure. Layered encryption provides us the ability to selectively disclose different parts of data to different parties that might be interested in it without compromising the security of the other parts. We have implemented a simple prototype implementation to demonstrate the practical feasibility of the concept by modifying IPSEC. Measurements from our implementation indicate that the Layered Encryption approach does not add unacceptable delays and does not substantially increase processing requirements at either the end points or at intermediate nodes.
منابع مشابه
Cloud computing adoption framework: A security framework for business clouds
This paper presents a Cloud Computing Adoption Framework (CCAF) security suitable for business clouds. CCAF multi-layered security is based on the development and integration of three major security technologies: firewall, identity management and encryption based on the development of Enterprise File Sync and Share technologies. This paper presents our motivation, related work and our views on ...
متن کاملOverview on Selective Encryption of Image and Video: Challenges and Perspectives
In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted using a standard cipher (DES, AES, IDEA, etc.). The specific characteristics of this kind of data (high-transmission rate with limited bandwidth) make standard encryption algorithms inadequate. Another limitation of fully la...
متن کاملA New Digital Signature Scheme from Layered Cellular Automata
Cellular Automata (CA) is one of the important tools to design cryptographic algorithms, and in the past years many researchers have explored several cryptographic algorithms based on CA. However, most of reported CAbased cryptographic algorithms focus on the symmetric key encryption schemes and few CA-based asymmetric encryption scheme has been proposed, let alone the CAbased digital signature...
متن کاملMulti-Layered Cryptographic Processor for Network Security
This paper presents a multi-layered architecture for the security of network and data using a layered structure of cryptographic algorithms. This architecture gives benefit of low area and high speed requirement. This paper mainly concern for security so architecture is designed in layers to avoid the possibilities of invasion from outsiders. This paper implements a combination of Private-Publi...
متن کاملRSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کامل