Filters








38,042 Hits in 2.9 sec

Cryptography and the internet [chapter]

Steven M. Bellovin
1998 Lecture Notes in Computer Science  
After many years, cryptography is coming to the Internet. Some protocols are in common use; more are being developed and deployed.  ...  The major issue has been one of cryptographic engineering: turning academic papers into a secure, implementable specification.  ...  What Cryptography Can't Do Cryptography is not a panacea for the security problems of the Internet.  ... 
doi:10.1007/bfb0055719 fatcat:k5rwymx5m5hr7enxxa77jkzll4

Cryptography and the internet: Lessons and challenges [chapter]

Kevin S. McCurley
1996 Lecture Notes in Computer Science  
Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet  ...  The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers.  ...  Looking forward in time and predicting the next trend in cryptography is a risky business, but I believe that the Internet will also mark a sea change in the development and use of cryptography.  ... 
doi:10.1007/bfb0034834 fatcat:2n2vliaku5a7bbkg3rgda2fuq4

Quantum Cryptography: The Future of Internet and Security Management

Faisal Abbasi, Amity Institute of Engineering and Technoogy, AUUP, Lucknow Campus
2021 Journal of Management and Service Science (JMSS)  
field, and the possible future of quantum cryptography.  ...  In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution.  ...  Authentication Analysis of Quantum Cryptography Implementation Security for internet communication network in the future should be guaranteed as everything done is online and all the information are  ... 
doi:10.54060/jmss/001.01.004 fatcat:f6qox5vmxvbqfaqlkiux5atwoy

Lightweight Cryptography and RFID: Tackling the Hidden Overhead

Axel Poschmann, Matthew Robshaw, Frank Vater, Christof Paar
2010 KSII Transactions on Internet and Information Systems  
The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published.  ...  Interestingly, the implementation requirements still remain within the typically-cited limits for on-the-tag cryptography.  ...  Acknowledgements We would like to thank Loïc Juniot, Marc Girault, Henri Gilbert, and Peter Langendörfer for their help and contributions.  ... 
doi:10.3837/tiis.2010.04.002 fatcat:pdysk7zdwvhjbcgeqhfvnfktqm

Quantum resistant public key cryptography

Ray A. Perlner, David A. Cooper
2009 Proceedings of the 8th Symposium on Identity and Trust on the Internet - IDtrust '09  
Public key cryptography is widely used to secure transactions over the Internet.  ...  based attacks and discuss some of the issues that protocol designers may need to consider if there is a need to deploy these algorithms at some point in the future.  ...  It has been used to verify the authenticity of software and legal records, to protect financial transactions, and to protect the transactions of millions of Internet users on a daily basis.  ... 
doi:10.1145/1527017.1527028 dblp:conf/idtrust/PerlnerC09 fatcat:ejh6oz6a55cx3n5p4mtxmcaf7i

Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography

P Rajesh, Mansoor Alam, Mansour Tahernezhadi, T Ravi, Vikram Phaneendra
2020 International Journal of Advanced Computer Science and Applications  
It routes a tremendous way to do this, the most popular one is cryptography, and another is steganography.  ...  Anteriorly there subsist many ways in these techniques like Image Steganography, Secret key Cryptography, LSB method, and so on which are being used to encrypt data and secure communication.  ...  digital object will be ordinary to all over the world as the cryptography is masking only on the content of the message and sending to the end receiver it may have some more reveal factor to the world  ... 
doi:10.14569/ijacsa.2020.0111057 fatcat:7tapqgrvmbalfifgazhsbtnhae

Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography? [chapter]

Eric Rescorla
2011 Lecture Notes in Computer Science  
While cryptography has advanced greatly since since 2001, Internet security protocols have not. Here is a list of the algorithms that are used in common SSL/TLS stacks:  ...  The situation is similar for other protocols such as IPsec and S/MIME.  ...  Despite this, implementors and users have responded either by ignoring these issues or by adding layers of countermeasures to the attacks which are presently known.  ... 
doi:10.1007/978-3-642-25578-6_24 fatcat:ylrlqk6ldjajbjkx5vy2y4vkna

Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security

Ghaith Alomari, Anas Aljarah
2021 Turkish Journal of Computer and Mathematics Education  
Network security has become more important to not public computer users, organizations, and the military.With the start of the internet, security became a major disquiet and the history of security allows  ...  The internet structure itself allowed for many security threats to occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network.  ...  The firms produce an "internet" to stay on the world wide web but procured from potential dangers.  ... 
doi:10.17762/turcomat.v12i6.4807 fatcat:hs4phyzbpndmbo6vuputqfsfai

The Improvement of the CurveCP Cryptography for enhancing the secure of Internet of Things

Tánh Nguyễn, Trí Quang Ngô, Giang Linh Nguyễn
2021 VNU Journal of Science Computer Science and Communication Engineering  
Our team also improved and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) so as to enhance data secure and information security of IoT System  ...  With the development of Information Technology, Internet of Things (IoT) has been applied widely in human civilization, but it leads the increase of the risk about information security.  ...  Acknowledgements Our team sends the gratefulness to tutors and the colleagues for providing adequate support about infrastructure and advice during the researching process.  ... 
doi:10.25073/2588-1086/vnucsce.282 fatcat:vwv54j47tnfdnenuabltkxzjy4

The Perception Layer Information Security Scheme for Internet of Things Based on Lightweight Cryptography

Jian Wei Guo, Na Yan, Jia Yu Chen, Shiyu Li
2018 DEStech Transactions on Computer Science and Engineering  
doi:10.12783/dtcse/icmsie2017/18664 fatcat:l74ksgkaxvei5bkovodbwyl5w4

Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices

David McCann, Kerstin Eder, Elisabeth Oswald
2015 2015 International Workshop on Secure Internet of Things (SIoT)  
40% and that memory instructions reduce the predictability of our energy model.  ...  In this way, we assess the additional energy consumption of using different SCA countermeasures and using lightweight block ciphers on 32 bit embedded devices.  ...  [8] looks at the energy cost, and other features, of lightweight cryptography in hardware.  ... 
doi:10.1109/siot.2015.11 dblp:conf/siot/McCannEO15 fatcat:ec5cta66pzha7iuu3wlejsm4eu

A Logical Issue for the Internet Community to Address Is That of Effective Cryptography Standards for the Conduct of Business and Personal Communications

Bappaditya Jana
2013 IOSR Journal of Computer Engineering  
The need for having three encryption techniques has also been encrypted .A detailed discussion has been done on the classical cryptography and the drawbacks of the classical cryptography to ensure the  ...  need for going to new trends in cryptography like quantum cryptography, elliptic curve cryptography.  ...  Cryptography is a tool which may alleviate many of the perceived problems of using the Internet for communications.  ... 
doi:10.9790/0661-1450131 fatcat:6azsldskp5abfgubwmkdfg3oki

Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)

Parikshit N. Mahalle, Neeli Rashmi Prasad, Ramjee Prasad
2014 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)  
Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services.  ...  This paper presents novel Threshold Cryptography-based Group Authentication (TCGA) scheme for the IoT which verifies authenticity of all the devices taking part in the group communication.  ...  Introduction The Internet of Things (IoT) refers to the network interconnection of everyday devices.  ... 
doi:10.1109/vitae.2014.6934425 dblp:conf/vitae/MahallePP14 fatcat:k656qdlcobgq7a7nbojcqinda4

Compiler Assisted Elliptic Curve Cryptography [chapter]

M. Barbosa, A. Moss, D. Page
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS  
Our results, which focus on Elliptic Curve Cryptography (ECC), show that a suitable language allows description of ECC based software in a manner close to the original mathematics; the corresponding compiler  ...  The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is an interesting research challenge.  ...  Acknowledgements The authors would like to thank various anonymous referees for their helpful comments, and Gregory Zaverucha for pointing out the automated method to generate modular reduction functions  ... 
doi:10.1007/978-3-540-76843-2_46 dblp:conf/otm/BarbosaMP07 fatcat:q6cbgni2zfapth7meffrm7z6au

The Perception Layer Information Secu-rity Scheme for Internet of Things based on Lightweight Cryptography

XiangYi Hu, LiPing Du, Ying Li
2013 Proceedings of the 2013 International Conference on Information, Business and Education Technology (ICIBET-2013)   unpublished
In smart chip of sensor/RFID reader device and encrypt card of the authentication center in the internet of things(IoT), the device authentication, signature/verification and encryption/decryption protocols  ...  This paper uses the lightweight (simple cryptography, high security and fast speed single-key cryptographic algorithms such as: RC4, RC5, SMS4 etc.) cryptography, and a security single-key management technology  ...  That is, the lightweight cryptography, hash algorithm and security protocols of sensing device which include authentication protocol, signature/encryption protocol are written into the smart chip.  ... 
doi:10.2991/icibet.2013.6 fatcat:ol7ypd7utvftjlx6dvxxe7nnm4
« Previous Showing results 1 — 15 out of 38,042 results