Filters








15,510 Hits in 6.0 sec

Generation, distribution, and installation of cryptographic keys

S. M. Matyas, C. H. Meyer
1978 IBM Systems Journal  
A key controlled cryptographic system requires a mechanism for the safe and secure generation, distribution, and installation of its cryptographic keys.  ...  Generation, distribution, and installation of cryptographic keys by S. M. Matyas and C. H. Meyer Key zeneration is the process that provides the cryptographic keys required by a cryptosystem.  ... 
doi:10.1147/sj.172.0126 fatcat:stkucuniqrhkrnl75tuud7hv7u

Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access

Sujit Sanjeev, Jatin Lodhia, Raghunathan Srinivasan, Partha Dasgupta
2011 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing  
The first method uses virtualization to isolate the sections of memory that contain cryptographic keys from an untrusted guest operating system (OS).  ...  Software cryptosystems face the challenge of secure key management.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the NSF.  ... 
doi:10.1109/passat/socialcom.2011.75 dblp:conf/socialcom/SanjeevLSD11 fatcat:r4v7o24sovfarfjybta5ik3fza

Common Cryptographic Architecture Cryptographic Application Programming Interface

D. B. Johnson, G. M. Dolan, M. J. Kelly, A. V. Le, S. M. Matyas
1991 IBM Systems Journal  
The Common Cryptographic Architecture key- management services allow a caller to support generation, installation, and distribution of cryp- tographic keys.  ...  Key Export. The Common Cryptographic Archi- tecture Cryptographic API supports electronic key distribution with minimal manual key instal- lation.  ... 
doi:10.1147/sj.302.0130 fatcat:kdxq3i4smbetljhuikciadrz5e

Cryptographic Software Solution for Information Protection in a Corporate Intranet

Veselin Tselkov
2000 Information & Security An International Journal  
Crypto Keys Distribution and Management Center Crypto Keys Distribution and Management Center generates, distributes and manages keys and passwords. It is connected with GCS.  ...  Key Distribution and Management Center (KDMS) KDMC generates keys and passwords according to the definitions by SACC.  ... 
doi:10.11610/isij.0406 fatcat:pb7iui6ofbce5cozsltn4lngym

ESA/390 Integrated Cryptographic Facility: An overview

P. C. Yeh, R. M. Smith, Sr.
1991 IBM Systems Journal  
Key management A DEA-based cryptographic system requires an effective mechanism for the secure generation, distribution, and installation of cryptographic keys.  ...  The generate-comple- mentary-keys function can be used to generate cryptographic keys of any type in the exportable state. The function can be used for both key gen- eration and key distribution.  ... 
doi:10.1147/sj.302.0192 fatcat:iugo7nci6vckpoku5a3rvqczxe

Key handling with control vectors

S. M. Matyas
1991 IBM Systems Journal  
Key distribution encompasses the processes of key generation, key delivery, and key importa- tion.  ...  Meyer, “‘Generation, Distribu- tion, and Installation of Cryptographic Keys,” JBM Sys- tems Journal 17, No. 2, 126-137 (1978). . R. E.  ... 
doi:10.1147/sj.302.0151 fatcat:u2dkz2xarfbrniqlxzkb77u4tm

Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform [article]

Shammya Shananda Saha, Christopher Gorog, Adam Moser, Anna Scaglione, Nathan G. Johnson
2020 arXiv   pre-print
This process of configuring, installing, and maintaining keys is described as Eco-Secure Provisioning(TM) (ESP(TM)).  ...  Results demonstrate the application of CTC(TM) to a blockchain-based Transactive Energy (TE) platform for provisioning of cryptographic keys and improved uniformity of the operational network and data  ...  Upon receiving, the Raspberry Pi parses the message and uses the underlying instruction, and it's own cryptographic key to generate it's OTP.  ... 
arXiv:2008.10705v1 fatcat:a27cnkb7xvg6xjxx7akcai7vwe

Future Applications of Cryptography

Charles Cresson Wood
1981 1981 IEEE Symposium on Security and Privacy  
In spite of disappointing aales of cryptographic equipment, the market for these devices is expected to rapidly expand over the next several years.  ...  Parker of SRI International, one bank service bureau in the New York City area actually had less security after the installation of encryption than it had prior to the installation.  ...  The erroneous generation of cryptographic keys does not affect information and communications system security or operations unless the key generated is one of the very unusual "weak keys" that can be easily  ... 
doi:10.1109/sp.1981.10013 dblp:conf/sp/Wood81 fatcat:ksq7wfvolnfenltb2e5h32hkha

Future applications of cryptography

Charles Cresson Wood
1982 Computers & security  
In spite of disappointing aales of cryptographic equipment, the market for these devices is expected to rapidly expand over the next several years.  ...  Parker of SRI International, one bank service bureau in the New York City area actually had less security after the installation of encryption than it had prior to the installation.  ...  The erroneous generation of cryptographic keys does not affect information and communications system security or operations unless the key generated is one of the very unusual "weak keys" that can be easily  ... 
doi:10.1016/0167-4048(82)90027-x fatcat:dnsrjxvsq5evbc4fhtxcppbn7e

Protecting cryptographic keys and computations via virtual secure coprocessing

John P. McGregor, Ruby B. Lee
2005 SIGARCH Computer Architecture News  
Thus, many systems protect keys with distributed protocols or supplementary hardware devices, such as smart cards and cryptographic coprocessors.  ...  With these enhancements, users can store, transport, and employ their secret keys to safely complete cryptographic operations in the presence of insecure software.  ...  Acknowledgements The authors wish to thank Sean Smith and the anonymous referees for their helpful comments and suggestions.  ... 
doi:10.1145/1055626.1055630 fatcat:kgqrx3fclvf2vmjqtmenmvuwzi

Key Management Techniques for Controlling the Distribution and Update of Cryptographic keys

T Lalith, R.Umarani, G.M.Kadharnawaz
2010 International Journal of Advanced Computer Science and Applications  
The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number of cryptographic keys, ultimately secured through trust in hardware  ...  a small number of easily monitored, controlled, and trustworthy elements.  ...  a small number of easily monitored, controlled, and trustworthy elements.  Initialization of system users within a domain  Generation, distribution, and installation of keying material  Controlling  ... 
doi:10.14569/ijacsa.2010.010624 fatcat:vh2rqtf2s5gsrfjejdfifl7sii

The Improvement of the CurveCP Cryptography for enhancing the secure of Internet of Things

Tánh Nguyễn, Trí Quang Ngô, Giang Linh Nguyễn
2021 VNU Journal of Science Computer Science and Communication Engineering  
This study describes briefly the improvement of CurveCP Lightweight cryptography by reducing length of cryptographic key as well as implement in IoT System.  ...  in new network platform generation.  ...  Acknowledgements Our team sends the gratefulness to tutors and the colleagues for providing adequate support about infrastructure and advice during the researching process.  ... 
doi:10.25073/2588-1086/vnucsce.282 fatcat:vwv54j47tnfdnenuabltkxzjy4

Transaction Security System extensions to the Common Cryptographic Architecture

D. B. Johnson, G. M. Dolan
1991 IBM Systems Journal  
The title and abstract, but no other portions, of this paper may be copied or distributed royalty free without further permission by computer-based and other information-service systems.  ...  In the Transaction Security System, the cryptographic subsystem is composed of system software and a hardware cryptographic facility.  ...  This suggests possible generation and distribution of a MAC Verify (MACVER) key.  ... 
doi:10.1147/sj.302.0230 fatcat:s7foicxcc5d5lizosbi5r4uvha

A Java cryptography service provider implementing one-time pad

T.E. Lindquist, M. Diarra, B.R. Millard
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
The major difficulty of the One-Time pad is key distribution.In this paper, we present an implementation of One-Time Pad as a JCA service provider, and demonstrate its usefulness on Palm devices.  ...  The One Time Pad encryption method is a simple and reliable cryptographic algorithm whose characteristics make it attractive for communication with limited computing devices.  ...  Key Management The generation and distribution of the random keys for this method is of primary concern.  ... 
doi:10.1109/hicss.2004.1265452 dblp:conf/hicss/LindquistDM04 fatcat:4k3oj2ythfhfzkg4vtyfhu3bfy

Powerful mobile nodes for enhancing wireless sensor networks' security and lifetime

Med Saïd Salah, Abderrahim Maizate, Mohamed Ouzzif, Mohamed Toumi
2019 Engineering review  
during key installation, time to generate and distribute cryptographic keys, and the memory used by the different sensors to store keys.  ...  The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying.  ...  Moreover, the results estimated how many messages we minimize during installation of the keys and how fast generating and storing of the ECC keys occur.  ... 
doi:10.30765/er.39.1.7 fatcat:elbwbqygincm5a2fupgxu3hngi
« Previous Showing results 1 — 15 out of 15,510 results