The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
A cryptographic key management scheme for implementing the Data Encryption Standard
1978
IBM Systems Journal
File security
The previous section described a key management scheme for protecting data communications. ...
In the latter case, the keys are managed by the system, and the implementation pro- vides cryptographic transparency. ...
doi:10.1147/sj.172.0106
fatcat:ufpf3l3aprbd7fcp5e7hldamfq
A Generic Evolution of Key Using Quantum Cryptography Management for Transcript
2016
Figshare
Not With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is ...
Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted file system a huge engineering exercise. ...
We also provide the kernel cryptographic algorithms necessary for implementing this key management scheme. ...
doi:10.6084/m9.figshare.3412342.v1
fatcat:5cplwbjmarfa7mxjvgb2hjktca
Key handling with control vectors
1991
IBM Systems Journal
Tuchman, “A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard,” JBM Systems Journal 17, No. 2, 106-125 (1978).
. S. M. Matyas and C. H. ...
To date, cryptographers and implementers of cryptographic standards and products have evolved key-distribution schemes concerned mostly with protocols for the exchange of keys
©Copyright 1991 by International ...
doi:10.1147/sj.302.0151
fatcat:u2dkz2xarfbrniqlxzkb77u4tm
A survey of encryption standards
1993
IEEE Micro
integrity, assuring that a message has not been modified; and key management, distributing the secret "keys" for cryptographic algorithms. ...
Numerous encryption standards dot the microcomputer landscape, seemingly covering every application. One nevertheless h d s much common ground underlying the many standards. ...
Acknowledgments 1 am grateful to Richard Ankney for sharing his standards expertise. ...
doi:10.1109/40.248057
fatcat:pio7rznzbneytnuxsrrd5mne4e
In Certificates We Trust -- Revisited
2015
2015 IEEE Trustcom/BigDataSE/ISPA
We propose to redistribute the tasks and require for a data sender to create an encryption key for himself and grant the recipient access to the key through authentication. ...
Today's state-of-the-art workÀow -when encrypting data for one or more recipients -requires for the sender to select the respective encryption keys. ...
The cryptographic basis of the actor is a simple RSA encryption scheme engine. ...
doi:10.1109/trustcom.2015.437
dblp:conf/trustcom/ReimairTP15
fatcat:pipilw6zrbepvi2rhsmbildx7u
A SECURED EMBEDDED SCHEME BASED ON MULTI-CRYPTOGRAPHIC PROTOCOLS
2017
Journal of Natural Sciences, Engineering and Technology
The four cryptographic techniques are combined to form an encryption protocol, coined MLES for a message to be securely transmitted. ...
In order to test the functionality of MLES scheme, it was implemented using Java 1.8.0 and tested on a text data. The result shows a feasible protocol that can secure a message in steganography. ...
Data Encryption Standard (DES) : is a symmetric algorithm based on block encryption algorithm (that is, message is divided into blocks of bits. ...
doi:10.51406/jnset.v15i2.1671
fatcat:zv3zcyfr55cdzk2tjpxvq5yzai
Sticky policies approach within cloud computing
2017
Computers & security
IBE is a public key asymmetric cryptographic primitive therefore for a given public key encrypting the message exists one private key decrypting the cipher-text with this message. ...
RMS encrypts AES key using RSA as a key wrap, then cipher-text is attached to the data. ...
doi:10.1016/j.cose.2017.07.005
fatcat:lowv2x5djndszk3fdbt5ndx4ni
Public Key Cryptography Standards: PKCS
[article]
2012
arXiv
pre-print
Cryptographic standards serve two important goals: making different implementations interoperable and avoiding various known pitfalls in commonly used schemes. ...
PKCS has been the basis for many other standards such as S/MIME. ...
The author would like to thank anonymous referees for the constructive comments on improving the presentation of this Chapter. ...
arXiv:1207.5446v1
fatcat:hsxkotdacjehjjbktwut74stba
DYNAMIC KEY DISTRIBUTION MANAGEMENT USING KEY ESCROW BASED ECC ALGORITHM IN MANETS
2020
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY
In the paper, we propose and implement a new methodology for dynamic key distribution. ...
For secure group based data transmission in the distributed environment, a secret key has to be shared among the users for the secured data transmission. ...
Physically powerful encryption algorithms and proper key management techniques for the systems will helps in achieving confidentiality, authentication and integrity of data. ...
doi:10.34218/ijaret.11.1.2020.014
fatcat:sjhkewzl25ex5cdh7vhaovkkoa
User Selective Encryption Method for Securing MANETs
2018
International Journal of Electrical and Computer Engineering (IJECE)
This paper introduces a user selective encryption method by operating Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol ...
for key management in order to improve MANET security. ...
necessary to design a lightweight and storage efficient key management scheme [2] [3] . ...
doi:10.11591/ijece.v8i5.pp3103-3111
fatcat:pwtfql2rtjf7hp7zp6xrzlmndy
Device-Based Security to Improve User Privacy in the Internet of Things †
2018
Sensors
The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead ...
The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. ...
In order to implement encrypted storage, a key management scheme is applied. ...
doi:10.3390/s18082664
pmid:30110880
fatcat:n36whxc5z5gilkolqjnni7csv4
Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones
[article]
2017
IACR Cryptology ePrint Archive
Therefore, there is a significant need for an efficient cryptographic framework that can meet the requirements of small aerial drones. ...
(i) We create (to the best of our knowledge) the first optimized public key infrastructure (PKI) based framework for small aerial drones, which provides energy efficient techniques by harnessing special ...
In addition, a key exchange protocol is essential for drones for the management/distribution of symmetric keys. ...
dblp:journals/iacr/OzmenY17
fatcat:nrp6phy3nzhdfmhm2klepryzva
Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility
[article]
2019
arXiv
pre-print
to the NIST PQC standards effort, applied cryptographers with expertise in creating cryptographic solutions and implementing cryptography in real-world settings, and industry practitioners with expertise ...
The implications of sufficiently large quantum computers for widely used public-key cryptography is well-documented and increasingly discussed by the security community. ...
is used to securely manage public and private
cloud infrastructures, including the transfer and storage
of private data; hardware devices use cryptographic
Key Infrastructure (PKI), key management ...
arXiv:1909.07353v1
fatcat:myqmftbsifh43g3ql7ejj4kpoi
Secure Outsourcing and Sharing of Cloud Data using a User-side Encrypted File System
2020
IEEE Access
SiRiUS [39] is a multiuser file system depends on an implemented key management scheme to encrypt individual files, and enforce data access only for authorized users. ...
However, the disadvantage of these schemes is the high key distribution and the key management efforts needed to manage the large number of encryption keys and maintain data privacy. ...
doi:10.1109/access.2020.3039163
fatcat:o2r5teldkbcxfibmx4ef5wlj5a
A Secure Database Encryption Scheme
2004
American Journal of Applied Sciences
As an optimal solution this paper presents a database encryption scheme that provides maximum security, whilst limiting the added time cost of encryption and decryption. ...
No matter what degree of security is put in place, sensitive data in database are still vulnerable to attack. To avoid the risk posed by this threat, database encryption has been recommended. ...
The encryption technique considered is Data Encryption Standard (DES), but the scheme is also applicable to other cryptographic techniques and standards. ...
doi:10.3844/ajassp.2004.327.331
fatcat:rq2dnfofdffgrldmcirt47gowe
« Previous
Showing results 1 — 15 out of 21,114 results