The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
Generation, distribution, and installation of cryptographic keys
1978
IBM Systems Journal
A key controlled cryptographic system requires a mechanism for the safe and secure generation, distribution, and installation of its cryptographic keys. ...
Generation, distribution, and installation of cryptographic keys
by S. M. Matyas and C. H. Meyer
Key zeneration is the process that provides the cryptographic keys required by a cryptosystem. ...
doi:10.1147/sj.172.0126
fatcat:stkucuniqrhkrnl75tuud7hv7u
Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access
2011
2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
The first method uses virtualization to isolate the sections of memory that contain cryptographic keys from an untrusted guest operating system (OS). ...
Software cryptosystems face the challenge of secure key management. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the NSF. ...
doi:10.1109/passat/socialcom.2011.75
dblp:conf/socialcom/SanjeevLSD11
fatcat:r4v7o24sovfarfjybta5ik3fza
Common Cryptographic Architecture Cryptographic Application Programming Interface
1991
IBM Systems Journal
The Common Cryptographic Architecture key- management services allow a caller to support generation, installation, and distribution of cryp- tographic keys. ...
Key Export. The Common Cryptographic Archi- tecture Cryptographic API supports electronic key distribution with minimal manual key instal- lation. ...
doi:10.1147/sj.302.0130
fatcat:kdxq3i4smbetljhuikciadrz5e
Cryptographic Software Solution for Information Protection in a Corporate Intranet
2000
Information & Security An International Journal
Crypto Keys Distribution and Management Center Crypto Keys Distribution and Management Center generates, distributes and manages keys and passwords. It is connected with GCS. ...
Key Distribution and Management Center (KDMS) KDMC generates keys and passwords according to the definitions by SACC. ...
doi:10.11610/isij.0406
fatcat:pb7iui6ofbce5cozsltn4lngym
ESA/390 Integrated Cryptographic Facility: An overview
1991
IBM Systems Journal
Key management
A DEA-based cryptographic system requires an effective mechanism for the secure generation, distribution, and installation of cryptographic keys. ...
The generate-comple- mentary-keys function can be used to generate cryptographic keys of any type in the exportable state. The function can be used for both key gen- eration and key distribution. ...
doi:10.1147/sj.302.0192
fatcat:iugo7nci6vckpoku5a3rvqczxe
Key handling with control vectors
1991
IBM Systems Journal
Key distribution encompasses the processes of key generation, key delivery, and key importa- tion. ...
Meyer, “‘Generation, Distribu- tion, and Installation of Cryptographic Keys,” JBM Sys- tems Journal 17, No. 2, 126-137 (1978).
. R. E. ...
doi:10.1147/sj.302.0151
fatcat:u2dkz2xarfbrniqlxzkb77u4tm
Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform
[article]
2020
arXiv
pre-print
This process of configuring, installing, and maintaining keys is described as Eco-Secure Provisioning(TM) (ESP(TM)). ...
Results demonstrate the application of CTC(TM) to a blockchain-based Transactive Energy (TE) platform for provisioning of cryptographic keys and improved uniformity of the operational network and data ...
Upon receiving, the Raspberry Pi parses the message and uses the underlying instruction, and it's own cryptographic key to generate it's OTP. ...
arXiv:2008.10705v1
fatcat:a27cnkb7xvg6xjxx7akcai7vwe
Future Applications of Cryptography
1981
1981 IEEE Symposium on Security and Privacy
In spite of disappointing aales of cryptographic equipment, the market for these devices is expected to rapidly expand over the next several years. ...
Parker of SRI International, one bank service bureau in the New York City area actually had less security after the installation of encryption than it had prior to the installation. ...
The erroneous generation of cryptographic keys does not affect information and communications system security or operations unless the key generated is one of the very unusual "weak keys" that can be easily ...
doi:10.1109/sp.1981.10013
dblp:conf/sp/Wood81
fatcat:ksq7wfvolnfenltb2e5h32hkha
Future applications of cryptography
1982
Computers & security
In spite of disappointing aales of cryptographic equipment, the market for these devices is expected to rapidly expand over the next several years. ...
Parker of SRI International, one bank service bureau in the New York City area actually had less security after the installation of encryption than it had prior to the installation. ...
The erroneous generation of cryptographic keys does not affect information and communications system security or operations unless the key generated is one of the very unusual "weak keys" that can be easily ...
doi:10.1016/0167-4048(82)90027-x
fatcat:dnsrjxvsq5evbc4fhtxcppbn7e
Protecting cryptographic keys and computations via virtual secure coprocessing
2005
SIGARCH Computer Architecture News
Thus, many systems protect keys with distributed protocols or supplementary hardware devices, such as smart cards and cryptographic coprocessors. ...
With these enhancements, users can store, transport, and employ their secret keys to safely complete cryptographic operations in the presence of insecure software. ...
Acknowledgements The authors wish to thank Sean Smith and the anonymous referees for their helpful comments and suggestions. ...
doi:10.1145/1055626.1055630
fatcat:kgqrx3fclvf2vmjqtmenmvuwzi
Key Management Techniques for Controlling the Distribution and Update of Cryptographic keys
2010
International Journal of Advanced Computer Science and Applications
The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number of cryptographic keys, ultimately secured through trust in hardware ...
a small number of easily monitored, controlled, and trustworthy elements. ...
a small number of easily monitored, controlled, and trustworthy elements. Initialization of system users within a domain Generation, distribution, and installation of keying material Controlling ...
doi:10.14569/ijacsa.2010.010624
fatcat:vh2rqtf2s5gsrfjejdfifl7sii
The Improvement of the CurveCP Cryptography for enhancing the secure of Internet of Things
2021
VNU Journal of Science Computer Science and Communication Engineering
This study describes briefly the improvement of CurveCP Lightweight cryptography by reducing length of cryptographic key as well as implement in IoT System. ...
in new network platform generation. ...
Acknowledgements Our team sends the gratefulness to tutors and the colleagues for providing adequate support about infrastructure and advice during the researching process. ...
doi:10.25073/2588-1086/vnucsce.282
fatcat:vwv54j47tnfdnenuabltkxzjy4
Transaction Security System extensions to the Common Cryptographic Architecture
1991
IBM Systems Journal
The title and abstract, but no other portions, of this paper may be copied or distributed royalty free without further permission by computer-based and other information-service systems. ...
In the Transaction Security System, the cryptographic subsystem is composed of system software and a hardware cryptographic facility. ...
This suggests possible generation and distribution of a MAC Verify (MACVER) key. ...
doi:10.1147/sj.302.0230
fatcat:s7foicxcc5d5lizosbi5r4uvha
A Java cryptography service provider implementing one-time pad
2004
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
The major difficulty of the One-Time pad is key distribution.In this paper, we present an implementation of One-Time Pad as a JCA service provider, and demonstrate its usefulness on Palm devices. ...
The One Time Pad encryption method is a simple and reliable cryptographic algorithm whose characteristics make it attractive for communication with limited computing devices. ...
Key Management The generation and distribution of the random keys for this method is of primary concern. ...
doi:10.1109/hicss.2004.1265452
dblp:conf/hicss/LindquistDM04
fatcat:4k3oj2ythfhfzkg4vtyfhu3bfy
Powerful mobile nodes for enhancing wireless sensor networks' security and lifetime
2019
Engineering review
during key installation, time to generate and distribute cryptographic keys, and the memory used by the different sensors to store keys. ...
The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. ...
Moreover, the results estimated how many messages we minimize during installation of the keys and how fast generating and storing of the ECC keys occur. ...
doi:10.30765/er.39.1.7
fatcat:elbwbqygincm5a2fupgxu3hngi
« Previous
Showing results 1 — 15 out of 15,510 results