Filters








7,303 Hits in 4.2 sec

An IKEv2-based Hybrid Authentication Scheme for Simultaneous Access Network and Home Network Authentication

MyeongJi KO, Hyogon KIM, Sung-Gi MIN
2021 IEICE transactions on communications  
We propose a hybrid authentication mechanism that can be used to authenticate a mobile node for both networks simultaneously.  ...  The proposed mechanism is based on the IKEv2-EAP exchanges instead of the EAP exchanges currently used to authenticate the access network, but our scheme adopts the encapsulation method defined by EAP-IKEv2  ...  Proposed Hybrid Authentication Procedure The proposed mechanism consists of three phases: (1) Open Authentication and Association, (2) IKEv2 Initial Exchange (IKE_SA_INIT), and (3) IKEv2 Authentication  ... 
doi:10.1587/transcom.2021ebp3066 fatcat:qjsbnfutwbcgdd6whdvgd4ijaa

Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication

Avinash Jain, V. Kapoor
2017 International Journal of Computer Applications  
This research study proposes hybrid cryptography is a permutation of Message digest and Symmetric Key cryptography algorithm in the form of Digital Envelope.  ...  This algorithm provides additional security as well as authentication comparing to other existing hybrid algorithm.  ...  The hybrid cryptosystem is itself a public-key structure, who's public and private keys are the equivalent as in the key encapsulation format.  ... 
doi:10.5120/ijca2017915151 fatcat:zlocrvbkrrhedfud2qaranvrci

Hybrid Signcryption Schemes with Outsider Security [chapter]

Alexander W. Dent
2005 Lecture Notes in Computer Science  
This paper expands the notion of a KEM-DEM hybrid encryption scheme to the signcryption setting by introducing the notion of a signcryption KEM, a signcryption DEM and a hybrid signcryption scheme.  ...  We also present ECISS-KEM -a simple, efficient and provably secure example of a signcryption KEM. Lastly, we briefly discuss the problems associated with using KEMs in key establishment protocols.  ...  Acknowledgements The author would like to thank John Malone-Lee, Liqun Chen, Fred Piper, Bodo Möller, Yevgeniy Dodis and Stéphanie Alt for their helpful comments.  ... 
doi:10.1007/11556992_15 fatcat:2eyunkd6nvaklk3w2xggne4b7e

Hybrid Cryptography Algorithm with Precomputation for Advanced Metering Infrastructure Networks

Samer Khasawneh, Michel Kadoch
2017 Journal on spesial topics in mobile networks and applications  
In this paper, we propose a sophisticated hybrid encryption scheme that incorporates public and symmetric key encryptions to secure smart metering network.  ...  Therefore, achieving secure and authentic communication in the smart grid networks is an indispensable requirement.  ...  [21] , proposed a cryptographic key exchange and authentication scheme based on media key block and the broadcast encryption protocol.  ... 
doi:10.1007/s11036-017-0956-0 fatcat:bq6efgw4n5ah5jvhdzkp2snwrq

Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms

Seyed Milad Dejamfar, Sara Najafzadeh
2017 International journal of network security and its applications  
Security and its subcategory authentication are among the important subjects of cloud computing. In this system, user authentication mechanisms are carried out before providing access to resources.  ...  Therefore, designing a secure user authentication mechanism significantly contributes to the overall security of the system.  ...  They used elliptic curve cryptography and Diffie-Hellman key exchange mechanisms for data encryption and communication establishment, respectively.  ... 
doi:10.5121/ijnsa.2017.9404 fatcat:hixsordowfe3pf56crigvxtjny

Implementation of IPsec-VPN Tunneling using GNS3

Fatimah A. Salman
2017 Indonesian Journal of Electrical Engineering and Computer Science  
IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator.  ...  The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.  ...  SSL) [7] [8] [9] .These protocols secure VPN and provide authentication and encryption mechanisms [4] . 1.  ... 
doi:10.11591/ijeecs.v7.i3.pp855-860 fatcat:uiq2h5o3czdpdos5ph4c4u225y

Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world

John M. Schanck, William Whyte, Zhenfei Zhang
2016 Proceedings on Privacy Enhancing Technologies  
We then prove that our new protocol, when instantiated with a post-quantum key encapsulation mechanism, achieves the stronger notion of transitional ACCE security.  ...  In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE) protocol and define pre-quantum, transitional, and post-quantum ACCE security.  ...  We also wish to thank: Aniket Kate for discussing potential improvements to our scheme, Douglas Stebila for several enlightening conversations, and the anonymous reviewers for their close readings and  ... 
doi:10.1515/popets-2016-0037 dblp:journals/popets/SchanckWZ16 fatcat:eylhs2de3nbbhguptw5te376he

Group Key Establishment in a Quantum-Future Scenario

María Isabel González Vasco, Ángel L. Pérez del Pozo, Rainer Steinwandt
2020 Informatica  
Our proposal uses password authentication and builds upon efficient and reasonably well understood primitives: a message authentication code and a post-quantum key encapsulation mechanism.  ...  The hybrid structure dodges potential efficiency downsides, like large signatures, of some "true" post-quantum authentication techniques, making our protocol a potentially interesting fit for current applications  ...  Key Encapsulation Mechanisms Key encapsulation mechanisms are public key algorithms suited for the generation and transfer of a high entropy key for later use.  ... 
doi:10.15388/20-infor427 fatcat:rnohrzkxtfcljblfmdohkuqxim

Prevention of DoS and Memory Exhaustion Attacks: Key Distribution with Confidentiality and Authentication

Paridhi Singhal, Manoj Diwakar, Mandeep Katre
2012 International Journal of Computer Applications  
For active and passive attacks( denial of services and memory exhaustion ) which are possible in 4-way handshake, this paper provides a secret key distribution with confidentiality and authentication and  ...  It is vulnerable to various active and passive attacks which include de-authentication and disassociation attacks.  ...  Key Distribution o Secret Key Distribution with Confidentiality and Authentication o A Hybrid Scheme  B compute D(PUa,D(PRb,M)) to recovery the secret key.  ... 
doi:10.5120/9365-3812 fatcat:2g444qgyg5gzxaac6jdjbkihwm

Attribute-Based Authenticated Key Exchange [chapter]

M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010 Lecture Notes in Computer Science  
A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is defined for EP-AB-KEMs.  ...  We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems.  ...  We call such a protocol, an attribute-based authenticated key exchange (AB-AKE) protocol.  ... 
doi:10.1007/978-3-642-14081-5_19 fatcat:7qkrqga6zneuvfp6hi3xcqsir4

ENHANCEMENT IN NETWORK SECURITY WITH SECURITY PROTOCOLS

G.Sankareeswari .
2013 International Journal of Research in Engineering and Technology  
Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network.  ...  This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server.  ...  PROTOCOLS FOR NETWORK SECURITY Kerberos Key Exchange Kerberos key exchange is a network authentication protocol. It was developed at MIT.  ... 
doi:10.15623/ijret.2013.0211070 fatcat:pisjti5sczec7ch5ybxerwusw4

A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems

Maik Ender, Gerd Duppmann, Alexander Wild, Thomas Poppelmann, Tim Guneysu
2014 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14)  
In this work we propose a secure architecture for Voice-over-IP (VoIP) that encapsulates all security and privacy critical components and I/O functions into secure hardware and thus drastically reduces  ...  Our proof-of-concept implementation shows that high security and reliance on established standards and software (e.g., device drivers, transmission control, and protocols) to keep development costs down  ...  If the call is established, the session key is used to achieve authenticity and confidentiality of exchanged audio packets by calling ENCAPSULATE ks (audio).  ... 
doi:10.1109/reconfig.2014.7032489 dblp:conf/reconfig/EnderDWPG14 fatcat:q45axngwwvby7fayobkshas2ae

Post-quantum MACsec in Ethernet Networks

Joo Yeon Cho, Andrew Sergeev
2021 Journal of Cyber Security and Mobility  
The proposed protocol is used in the hybrid mode, an ephemeral key exchange, and an end-to-end encryption.  ...  We propose an authenticated post-quantum key establishment protocol which is suitable for long-term secure MACsec.  ...  Acknowledgment This research is co-funded by the Federal Ministry of Education and Research of Germany under the QuaSiModO project (Grant agreement No 16KIS1051).  ... 
doi:10.13052/jcsm2245-1439.1016 fatcat:wntvv7anxjah7eoxudsyoew6ra

HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OF THINGS APPLICATIONS: A REVIEW

Nur Nabila Mohamed, Yusnani Mohd Yussof, Mohammed Ahmed Saleh, Habibah Hashim
2020 Journal of Information and Communication Technology  
efficiency of securing data and solving the issue of key distribution.  ...  In addition, AES and ECC have been found to be the most popular methods used in the hybrid approach due to its computing speed and security resistance among other schemes.  ...  ACKNOWLEDGMENT The authors would like to thank the Ministry of Higher Education and the Research Management Institute, Universiti Teknologi MARA (UiTM)  ... 
doi:10.32890/jict2020.19.3.1 fatcat:dnur6fbzvve4jockrantiqwd5q

A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture [chapter]

Tomasz Hyla, Jerzy Pejaś
2013 Lecture Notes in Computer Science  
In order to encrypt arbitrary-length messages, we also suggest a new CIBE-GAS-H scheme with a key encapsulation mechanism based on the techniques of Bentahar et al., and combined with one-time symmetric-key  ...  The paper proposes a reference architecture of public key cryptography infrastructure required to implement CIBE-GAS scheme.  ...  Loosely speaking, such a scheme is based on the well-known KEM-DEM framework [13, 15] using the key encapsulation mechanism (KEM) and data encapsulation mechanism (DEM).  ... 
doi:10.1007/978-3-642-40925-7_19 fatcat:llgfa5vsvzhidaibvzpj2bakbi
« Previous Showing results 1 — 15 out of 7,303 results