Filters








5,499 Hits in 4.9 sec

Robust Authenticated Encryption and the Limits of Symmetric Cryptography [chapter]

Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015 Lecture Notes in Computer Science  
This provides new insights into the limits of symmetric cryptography.  ...  Robust authenticated encryption (RAE) is a primitive for symmetric encryption that allows to flexibly specify the ciphertext expansion, i.e., how much longer the ciphertext is compared to the plaintext  ...  P2EZP2_155566 and the NSF grants CNS-1228890 and CNS-1116800. Much of the work on this paper was done while Phil Rogaway was visiting Ueli Maurer's group at ETH Zurich.  ... 
doi:10.1007/978-3-319-27239-9_7 fatcat:n3ev654wa5hclooamdsv3u4nga

Authentication techniques in smart grid: a systematic review

Malik Qasaimeh, Rawan Turab, Raad S. Al-Qassas
2019 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
However due to the vulnerability of SG, secure component authenticity necessitates robust authentication approaches relative to limited resource availability (i.e. in terms of memory and computational  ...  This provides a basis for the design and use of optimized SG authentication approaches.  ...  SSCA and PSCAb protocols of password authentication were tested in PS22, the former of which deployed symmetric key encryption, while the latter used public key encryption.  ... 
doi:10.12928/telkomnika.v17i3.11437 fatcat:dgd6isfh3vesfcw5up6oiuehjq

A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications

Aji Purwinarko, Wahyu Hardyanto
2018 Scientific Journal of Informatics  
With the utilization of a large block size of AES and Blowfish to encrypt keys, AES security will be much more robust and complicated to attacked.  ...  This article presents an authentication in the mobile application to the server using a hybrid of cryptographic algorithm Advanced Encryption Standard (AES) and Blowfish.  ...  In the symmetric key cryptography, requires the same key to encrypt and decrypt a message [2] . In this paper, we will learn the basic algorithms of common AES and Blowfish.  ... 
doi:10.15294/sji.v5i1.8151 fatcat:dufjbwbmrneubm7csiib6nhttm

Hybrid Key Management Scheme for Wireless Sensor Networks

R Sharmila, V Vijayalakshmi
2015 International Journal of Security and Its Applications  
In this paper, the hybrid key management scheme is proposed by combining public key cryptography scheme with symmetric scheme. The symmetric keys are generated by using genetic algorithm.  ...  Many key management schemes have been proposed in systematically deployed Wireless Sensor Networks (WSNs).The sensor nodes are equipped with inadequate battery power, low memory, limited computation and  ...  In the symmetric key management scheme, both the sender and receiver share a common key for encryption and decryption.  ... 
doi:10.14257/ijsia.2015.9.11.13 fatcat:bgbfnlnctva6ne22snrgptfuee

Security Frameworks for Wireless Sensor Networks-Review

Gaurav Sharma, Suman Bala, Anil K. Verma
2012 Procedia Technology - Elsevier  
This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled.  ...  Since WSN suffer from many constraints including lower processing power, low battery life, small memory and wireless communication channel, security becomes the main concern to deal with such kind of networks  ...  ., 2008 had a look on the benefits of using hardware encryption for symmetric encryption to reduce encrypting costs.  ... 
doi:10.1016/j.protcy.2012.10.119 fatcat:6vmzafrfabhlfa47iy35uhq4zm

A cryptographic scheme for real-world wireless sensor networks applications

S. Marchesani, L. Pomante, F. Santucci, M. Pugliese
2013 Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems - ICCPS '13  
However, when computational resources are limited, asymmetric cryptography could be not feasible and symmetric cryptography must be revalued.  ...  In such networks, the amount of available computational, memory and power resources make it possible to ignore the main pitfall of this strategy: the robustness of asymmetric algorithms is highly dependent  ...  ACKNOWLEDGMENTS This work has been partially supported by the ERC Starting Grant VISION (Contract n. 240555).  ... 
doi:10.1145/2502524.2502568 dblp:conf/iccps/MarchesaniPSP13 fatcat:ycktusih5vdhpi7tcrtfat4254

Security Vulnerability and Robust Security Requirements using Key Management in Sensor Network

Jaykumar Shantilal Patel, Vijaykumar Chavda
2014 International Journal of Grid and Distributed Computing  
The secure exchange of secrete key is the major issue related to the symmetric cryptography implementation. The asymmetric one is better than the symmetric in term of providing robust security.  ...  The numbers of mechanisms are available to provide robust security in sensor network using asymmetric or symmetric concept of cryptography.  ...  Confidentiality can achieve through encryption algorithms. The encryption algorithms may have symmetric or asymmetric in nature.  ... 
doi:10.14257/ijgdc.2014.7.3.03 fatcat:bmpkikvtxrbxnj46c72vb5hbum

An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks

Benamar Kadri, Djilalli Moussaoui, Mohammed Feham, Abdellah Mhammed
2012 Wireless Sensor Network  
In this paper we propose a lightweight implementation of public key infrastructure called cluster based public infrastructure (CBPKI), CBPKI is based on the security and the authenticity of the base station  ...  Regarding the nature of sensors and the nature of the environment of deployment sensor networks are exposed to many attacks more than any other networks, therefore new strategies and protocols of security  ...  of the used keys as well as the robustness of the encrypting algorithms. .  ... 
doi:10.4236/wsn.2012.46022 fatcat:rorwm3yv4vdnlgcjhpnb6mn3ci

Importance and Techniques of Information Hiding : A Review
English

Richa Gupta, Sunny Gupta, Anuradha Singhal
2014 International Journal of Computer Trends and Technology  
This paper reviews the techniques that exist for data hiding and how can these be combined to provide another level of security.  ...  It provided methods for encrypting the information so that it becomes unreadable for any unintended user.  ...  Symmetric key cryptography -it refers to the encryption methods in which the sender and the receiver share the same key.  ... 
doi:10.14445/22312803/ijctt-v9p149 fatcat:d2sgdjm3wveo5d6ilmmoba4bfu

A Review On Securing Distributed Systems Using Symmetric Key Cryptography [article]

Ramesh Babu, George Abraham, Kiransinh Borasia
2013 arXiv   pre-print
This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems.  ...  We review two widely used and popular symmetric key cryptographic algorithms, viz. DES and AES.  ...  He talks about the limitations of Data Encryption Standard (DES) algorithm and there was a need for it to be replaced.  ... 
arXiv:1303.0351v1 fatcat:xn2m7ovwofeorh2bppxzfb4dj4

Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions

Daniel Costa, Solenir Figuerêdo, Gledson Oliveira
2017 Cryptography  
However, the usual resource constraints of processing, memory and the energy of multimedia-based sensors have brought different challenges for data encryption, which have driven the development of different  ...  In this context, this article presents the state-of-the-art of cryptography in wireless multimedia sensor networks, surveying innovative works in this area and discussing promising research directions.  ...  deal with some constraints that can limit the applicability of cryptography algorithms.  ... 
doi:10.3390/cryptography1010004 fatcat:diu2u5rq25dzlg4nqo5cwulgnq

COMPARATIVE ANALYSIS OF INTERNET OF THINGS LIGHTWEIGHT AUTHENTICATION PROTOCOL DESIGN SCHEMES

S.B. Thorat
2017 International Journal of Advanced Research in Computer Science  
Finally, we provide a comparative study of using symmetric and asymmetric cryptography techniques for designing lightweight authentication protocols for IoT.  ...  Also, we highlight some principals and security requirements for the implementation of lightweight authentication.  ...  There are two types of symmetric-base authentication the first one is to use one of the well-known symmetric cryptography algorithms such as Advance Encryption Standard algorithm (AES) or Data Encryption  ... 
doi:10.26483/ijarcs.v8i7.4050 fatcat:elsoltly65awjfhfwbck7v7zjy

A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

Omid Mahdi Ebadati E., Farshad Eshghi, Amin Zamani
2020 CMES - Computer Modeling in Engineering & Sciences  
The proposed algorithm fulfills three principles of cryptography: integrity, confidentiality and authentication.  ...  The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.  ...  Conflicts of Interest: I hereby declare that there is no conflict of interest related to this manuscript (article) entitled "Fusion of Medical Images in Wavelet Domain: A Hybrid Implementation" with manuscript  ... 
doi:10.32604/cmes.2020.08079 fatcat:thissiwhpvfyzbxf6pvic4n5x4

Efficient Approach for Securing Message Communication in Wireless Sensor Networks from Node Clone Attack

Vandana Mohindru, Yashwant Singh
2016 Indian Journal of Science and Technology  
This algorithm makes use of the hybrid cryptography technique which consist of Advanced Encryption Standard (AES) and Elliptical Curve Cryptography (ECC) and lightweight hash function.  ...  In this algorithm, AES algorithm encrypts the message and digital signature whereas ECC algorithm encrypts the private key and generates digital signature.  ...  Hybrid Cryptography: Hybrid cryptography is a blend of symmetric and asymmetric cryptography 15 .  ... 
doi:10.17485/ijst/2016/v9i32/100725 fatcat:25ov4e2ubvbqxirhq5gqqzji6u

Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review

Malik Qasaimeh, Raad S. Al-Qassas, Shadi Aljawarneh
2019 Cybernetics and Information Technologies  
This paper analyses previous literature, comprising 27 papers on the status of SG authentication techniques, main components, and kinds of attacks.  ...  However, SG is vulnerable to attacks and requires robust authentication techniques to provide secure authenticity for its components.  ...  The first approach utilized the concept of symmetric key encryption, and the second utilized the concept of public key encryption.  ... 
doi:10.2478/cait-2019-0002 fatcat:hzuljrbaozhwdirfbk3db2l2re
« Previous Showing results 1 — 15 out of 5,499 results