نتایج جستجو برای: symmetric key

تعداد نتایج: 629241  

2005
Fengguang An Xiuzhen Cheng Qing Xia Fang Liu Liran Ma

In this paper, we propose SeGrid, a secure grid infrastructure for large scale sensor networks. The basic idea relies on the availability of a low-cost public cryptsystem (e.g. Blom’s key management scheme [4]) that can be used for shared key computation between the source and the destination, as long as the public shares are known to each other. In SeGrid, each sensor resides in a grid compute...

2000
Jaap-Henk Hoepman

Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secure storage of any secret information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key which is derived from a symmetric master key. Software only verification means that the ...

2003
Rong Chen Yadong Gui Ji Gao

The Kerberos is applied widely in OS and grid computing environment. The Kerberos system isn’t secure enough for symmetrical encryption. The paper describes a method that transform symmetrical key into asymmetric encryption on the basis of keeping symmetrical key of one side changeless. The algorithm strengthens the security of Kerberos protocol through proofing.

2007
Keisuke Tanaka

Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...

2010
G. Ramesh R. Umarani

Abstract Hacking is one of the greatest problems in the wireless local area networks. Many algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user safely and correctly. In this paper, a new symmetrical encryption algorithm is proposed that prevents the outside attacks. The new algorithm avoids key exchange between users and red...

2004
Shaobin Cai Xiao-Zong Yang Jing Zhao

Ad hoc Sensor Networks (ASNs) are ad-hoc mobile networks that consist of sensor nodes with limited computation and communication capabilities. Because ASNs may be deployed in hostile areas, where communication is monitored and nodes are subject to be captured by an adversary, ASNs need a cryptographic protection of communications and sensor-capture detection. According to that the ASN is deploy...

2003
Omer Horvitz Virgil D. Gligor

A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this direction was taken by Abadi and Rogaway [AR02]. Considering a formal language that treats symmetric encryption, [AR02] show that an associated formal semantics is sound with respect to an associated computational semantics, under a p...

Journal: :Groups Complexity Cryptology 2009
Martin Kreuzer

Received: May 15, 2009 This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques ...

2004
Yann-Hang Lee Vikram Phadke Amit Deshmukh Jin Wook Lee

Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nat...

2002
Sandeep S. Kulkarni Bezawada Bruhadeshwar

In this paper, we focus on the problem of secure multicast in dynamic groups. In this problem, a group of users communicate using a shared key. Due to the dynamic nature of these groups, to preserve secrecy, it is necessary to change the group key whenever the group membership changes. While the group key is being changed, the group communication needs to be interrupted until the rekeying is co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید