A Modular Approach to Key Distribution
نویسندگان
چکیده
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. As a result of varied design decisions appropriate to different conditions, a large variety of key distribution protocols exist. There is a need tu explicate key distribution protocols in a way that allows to understand which results they achieve and on which assumptions they depend. We define a modular system that can be used to transform cryptographic protocols into a generic form and that has proven to be useful in the analysis and the construction of such protocols.
منابع مشابه
Modular approach for an ASIC integration of electrical drive controls
VLSI circuits design allows today to consider new modes of implementation for electrical controls. However, design techniques require an adaptation effort that few designers, too accustomed to the software approach, provide. The authors of this article propose to develop a methodology to guide the electrical designers towards optimal performances of control algorithms implementation. Thus, they...
متن کاملEFFICIENT SIMULATION FOR OPTIMIZATION OF TOPOLOGY, SHAPE AND SIZE OF MODULAR TRUSS STRUCTURES
The prevalent strategy in the topology optimization phase is to select a subset of members existing in an excessively connected truss, called Ground Structure, such that the overall weight or cost is minimized. Although finding a good topology significantly reduces the overall cost, excessive growth of the size of topology space combined with existence of varied types of design variables challe...
متن کاملA fixed point approach to the Hyers-Ulam stability of an $AQ$ functional equation in probabilistic modular spaces
In this paper, we prove the Hyers-Ulam stability in$beta$-homogeneous probabilistic modular spaces via fixed point method for the functional equation[f(x+ky)+f(x-ky)=f(x+y)+f(x-y)+frac{2(k+1)}{k}f(ky)-2(k+1)f(y)]for fixed integers $k$ with $kneq 0,pm1.$
متن کاملInvestigation the status of instructional design with modular method in medical education
Background and Goal: Modular method is a form of in-service training which provides job skills into a form of independent training of audiences. Each of modular provides specific skill and at the same time besides the other modular led to a new and comprehensive skill. In fact, any educational modular is a set of knowledge, attitudes and skills which by using them it can be possible to do ...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کامل