Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices
نویسندگان
چکیده
Voice signal Goals Cryptographic key for cryptographic applications Main criteria • Key (re)generation for user should be reliable and efficient on resource-constrained devices • Key search should be difficult for attacker, even with captured device
منابع مشابه
Efficient Ephemeral Elliptic Curve Cryptographic Keys
We show how any pair of authenticated users can on-the-fly agree on an elliptic curve group that is unique to their communication session, unpredictable to outside observers, and secure against known attacks. Our proposal is suitable for deployment on constrained devices such as smartphones, allowing them to efficiently generate ephemeral parameters that are unique to any single cryptographic a...
متن کاملCryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملS3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things
DTLS is becoming the de facto standard for communication security in the Internet of Things. In order to run the DTLS protocol one needs to establish keys between the communicating devices. The default method of key establishment requires X.509 certificates and a Public Key Infrastructure, an approach which is often too resource consuming for small IoT devices. DTLS also supports the use of pre...
متن کاملBEST - 1 : A Light Weight Block Cipher
The demand for applications involving Wireless Sensor Network (WSN) or RFID systems is increasing. The sensor in a WSN and RFID tag/reader in a RFID system are called resource constrained devices because these devices have limited processing power, memory size and energy supply. The information transmitted among these low resource devices must be protected from unauthorized access using specifi...
متن کامل