Filters








21,114 Hits in 6.9 sec

A cryptographic key management scheme for implementing the Data Encryption Standard

W. F. Ehrsam, S. M. Matyas, C. H. Meyer, W. L. Tuchman
1978 IBM Systems Journal  
File security The previous section described a key management scheme for protecting data communications.  ...  In the latter case, the keys are managed by the system, and the implementation pro- vides cryptographic transparency.  ... 
doi:10.1147/sj.172.0106 fatcat:ufpf3l3aprbd7fcp5e7hldamfq

A Generic Evolution of Key Using Quantum Cryptography Management for Transcript

Shrey Agrawal
2016 Figshare  
Not With data storage and processing snowballing into a necessity from being an efficient part of any business process or organization, the need for securing storage at various degrees of granularity is  ...  Further, narrowing the trust circle to exclude even hitherto trusted system administrators makes creating an encrypted file system a huge engineering exercise.  ...  We also provide the kernel cryptographic algorithms necessary for implementing this key management scheme.  ... 
doi:10.6084/m9.figshare.3412342.v1 fatcat:5cplwbjmarfa7mxjvgb2hjktca

Key handling with control vectors

S. M. Matyas
1991 IBM Systems Journal  
Tuchman, “A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard,” JBM Systems Journal 17, No. 2, 106-125 (1978). . S. M. Matyas and C. H.  ...  To date, cryptographers and implementers of cryptographic standards and products have evolved key-distribution schemes concerned mostly with protocols for the exchange of keys ©Copyright 1991 by International  ... 
doi:10.1147/sj.302.0151 fatcat:u2dkz2xarfbrniqlxzkb77u4tm

A survey of encryption standards

B. Kaliski
1993 IEEE Micro  
integrity, assuring that a message has not been modified; and key management, distributing the secret "keys" for cryptographic algorithms.  ...  Numerous encryption standards dot the microcomputer landscape, seemingly covering every application. One nevertheless h d s much common ground underlying the many standards.  ...  Acknowledgments 1 am grateful to Richard Ankney for sharing his standards expertise.  ... 
doi:10.1109/40.248057 fatcat:pio7rznzbneytnuxsrrd5mne4e

In Certificates We Trust -- Revisited

Florian Reimair, Peter Teufl, Bernd Prunster
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
We propose to redistribute the tasks and require for a data sender to create an encryption key for himself and grant the recipient access to the key through authentication.  ...  Today's state-of-the-art workÀow -when encrypting data for one or more recipients -requires for the sender to select the respective encryption keys.  ...  The cryptographic basis of the actor is a simple RSA encryption scheme engine.  ... 
doi:10.1109/trustcom.2015.437 dblp:conf/trustcom/ReimairTP15 fatcat:pipilw6zrbepvi2rhsmbildx7u

A SECURED EMBEDDED SCHEME BASED ON MULTI-CRYPTOGRAPHIC PROTOCOLS

S A ONASHOGA, O OYELEKE, O A OJESANMI, A A AGBOOLA
2017 Journal of Natural Sciences, Engineering and Technology  
The four cryptographic techniques are combined to form an encryption protocol, coined MLES for a message to be securely transmitted.  ...  In order to test the functionality of MLES scheme, it was implemented using Java 1.8.0 and tested on a text data. The result shows a feasible protocol that can secure a message in steganography.  ...  Data Encryption Standard (DES) : is a symmetric algorithm based on block encryption algorithm (that is, message is divided into blocks of bits.  ... 
doi:10.51406/jnset.v15i2.1671 fatcat:zv3zcyfr55cdzk2tjpxvq5yzai

Sticky policies approach within cloud computing

Grzegorz Spyra, William J. Buchanan, Elias Ekonomou
2017 Computers & security  
IBE is a public key asymmetric cryptographic primitive therefore for a given public key encrypting the message exists one private key decrypting the cipher-text with this message.  ...  RMS encrypts AES key using RSA as a key wrap, then cipher-text is attached to the data.  ... 
doi:10.1016/j.cose.2017.07.005 fatcat:lowv2x5djndszk3fdbt5ndx4ni

Public Key Cryptography Standards: PKCS [article]

Yongge Wang
2012 arXiv   pre-print
Cryptographic standards serve two important goals: making different implementations interoperable and avoiding various known pitfalls in commonly used schemes.  ...  PKCS has been the basis for many other standards such as S/MIME.  ...  The author would like to thank anonymous referees for the constructive comments on improving the presentation of this Chapter.  ... 
arXiv:1207.5446v1 fatcat:hsxkotdacjehjjbktwut74stba

DYNAMIC KEY DISTRIBUTION MANAGEMENT USING KEY ESCROW BASED ECC ALGORITHM IN MANETS

B. VANATHY, M. RAMAKRISHNAN
2020 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY  
In the paper, we propose and implement a new methodology for dynamic key distribution.  ...  For secure group based data transmission in the distributed environment, a secret key has to be shared among the users for the secured data transmission.  ...  Physically powerful encryption algorithms and proper key management techniques for the systems will helps in achieving confidentiality, authentication and integrity of data.  ... 
doi:10.34218/ijaret.11.1.2020.014 fatcat:sjhkewzl25ex5cdh7vhaovkkoa

User Selective Encryption Method for Securing MANETs

Amal Ahmad, Shereen Ismail
2018 International Journal of Electrical and Computer Engineering (IJECE)  
This paper introduces a user selective encryption method by operating Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol  ...  for key management in order to improve MANET security.  ...  necessary to design a lightweight and storage efficient key management scheme [2] [3] .  ... 
doi:10.11591/ijece.v8i5.pp3103-3111 fatcat:pwtfql2rtjf7hp7zp6xrzlmndy

Device-Based Security to Improve User Privacy in the Internet of Things †

Luis Belem Pacheco, Eduardo Pelinson Alchieri, Priscila Mendez Barreto
2018 Sensors  
The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead  ...  The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices.  ...  In order to implement encrypted storage, a key management scheme is applied.  ... 
doi:10.3390/s18082664 pmid:30110880 fatcat:n36whxc5z5gilkolqjnni7csv4

Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones [article]

Muslum Ozgur Ozmen, Attila A. Yavuz
2017 IACR Cryptology ePrint Archive  
Therefore, there is a significant need for an efficient cryptographic framework that can meet the requirements of small aerial drones.  ...  (i) We create (to the best of our knowledge) the first optimized public key infrastructure (PKI) based framework for small aerial drones, which provides energy efficient techniques by harnessing special  ...  In addition, a key exchange protocol is essential for drones for the management/distribution of symmetric keys.  ... 
dblp:journals/iacr/OzmenY17 fatcat:nrp6phy3nzhdfmhm2klepryzva

Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility [article]

David Ott, Christopher Peikert, other workshop participants
2019 arXiv   pre-print
to the NIST PQC standards effort, applied cryptographers with expertise in creating cryptographic solutions and implementing cryptography in real-world settings, and industry practitioners with expertise  ...  The implications of sufficiently large quantum computers for widely used public-key cryptography is well-documented and increasingly discussed by the security community.  ...  is used to securely manage public and private cloud infrastructures, including the transfer and storage of private data; hardware devices use cryptographic Key Infrastructure (PKI), key management  ... 
arXiv:1909.07353v1 fatcat:myqmftbsifh43g3ql7ejj4kpoi

Secure Outsourcing and Sharing of Cloud Data using a User-side Encrypted File System

Osama A. Khashan
2020 IEEE Access  
SiRiUS [39] is a multiuser file system depends on an implemented key management scheme to encrypt individual files, and enforce data access only for authorized users.  ...  However, the disadvantage of these schemes is the high key distribution and the key management efforts needed to manage the large number of encryption keys and maintain data privacy.  ... 
doi:10.1109/access.2020.3039163 fatcat:o2r5teldkbcxfibmx4ef5wlj5a

A Secure Database Encryption Scheme

Zongkai Yang, Samba Sesay, Jingwen Chen, Du Xu
2004 American Journal of Applied Sciences  
As an optimal solution this paper presents a database encryption scheme that provides maximum security, whilst limiting the added time cost of encryption and decryption.  ...  No matter what degree of security is put in place, sensitive data in database are still vulnerable to attack. To avoid the risk posed by this threat, database encryption has been recommended.  ...  The encryption technique considered is Data Encryption Standard (DES), but the scheme is also applicable to other cryptographic techniques and standards.  ... 
doi:10.3844/ajassp.2004.327.331 fatcat:rq2dnfofdffgrldmcirt47gowe
« Previous Showing results 1 — 15 out of 21,114 results