نتایج جستجو برای: symmetric key

تعداد نتایج: 629241  

2005
Adrian Carlos Ferreira Marcos Aurélio Vilaça Leonardo B. Oliveira Eduardo Habib Hao Chi Wong Antonio Alfredo Ferreira Loureiro

Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and energy efficiency. In this paper, we inve...

Journal: :IACR Cryptology ePrint Archive 2016
Gajraj Kuldeep Devendra Kumar Yadav A. K. Sharma

In this paper security aspects of the existing symmetric key encryption schemes based on Hadamard matrices are examined. Hadamard matrices itself have symmetries like one circulant core or two circulant core. Here, we are exploiting the inherent symmetries of Hadamard matrices and are able to perform attacks on these encryption schemes. It is found that entire key can be obtained by observing t...

Journal: :I. J. Network Security 2013
Cheng-Chi Lee Shih-Ting Hsu Min-Shiang Hwang

We study the development of conjunctive keyword searchable scheme which enables one to search encrypted documents by using more than one keyword. The notion of conjunctive keyword searching was presented by Golle et al. in 2004. However, their security model was constructed in a symmetric-key setting which is not applicable for the overall applications in the reality. So Park et al. extended Go...

2004
Cariappa Mallanda Shivakumar Basavaraju Archit Kulshrestha Rajgopal Kannan Arjan Durresi S. Sitharama Iyengar

Present research on wireless sensor networks has focused on routing and security independently. In this paper, we present a Secure, Cluster-based, Energy Aware Routing (SCEAR) scheme that provides both a hierarchal energy aware routing and a secure environment for communication. In our approach, the network is divided into clusters with a cluster-head that aggregates the information and securel...

1997
Simon Blake-Wilson Alfred Menezes

This paper investigates security proofs for protocols that employ asymmetric (public-key) techniques to solve two problems: entity authentication and authenticated key transport. A formal model is provided, and a deenition of the goals within this model is supplied. Two protocols are presented and proven secure within this framework, given the existence of certain cryptographic primitives. The ...

2007
Patrick Schaller Srdjan Capkun David A. Basin

We present two broadcast authentication protocols based on delayed key disclosure. Our protocols rely on symmetric-key cryptographic primitives and use cryptographic puzzles to provide efficient broadcast authentication in different application scenarios, including those with resource-constrained wireless devices such as sensor nodes. The strong points of the protocols proposed are that one all...

Journal: :IACR Cryptology ePrint Archive 2012
Hans-Joachim Knobloch

Not surprisingly, the common use of any public key crypto system involves publishing the public key and keeping the private key secret. There are however a few applications where both the private and public key are kept secret, thereby effectively converting a public key crypto algorithm to a symmetric algorithm. We show that if the RSA cryptosystem is used in such a symmetric application, it i...

Journal: :JCIT 2010
Changsheng Wan Aiqun Hu Juan Zhang

This paper proposes a novel authentication protocol for wireless access security. Current symmetric key based authentication schemes are vulnerable to a variety of attacks such as the denialof-service attacks and the domino effect attacks, while public key based authentication schemes are costly. This paper designed a novel elliptic curve based authentication scheme that can avoid the certifica...

2010
Oscar Delgado-Mohatar José María Sierra Ljiljana Brankovic Amparo Fúster-Sabater

Sensor networks are ad-hoc mobile networks that include sensor nodes with limited computational and communication capabilities. They have become an economically viable monitoring solution for a wide variety of applications. Obviously, it is important to ensure security and, taking into account limited resources available in wireless sensor networks, the use of symmetric cryptography is strongly...

Journal: :CoRR 2015
Akashdeep Bhardwaj GVB Subrahmanyam Vinay Avasthi Hanumat Sastry

With growing awareness and concerns regards to Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms into data systems and processes. This paper presents a brief overview and comparison of Cryptographic algorithms, with an emphasis on Symmetric algorithms which should be used for Cloud based applications and services that require data and link enc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید