A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Types and effects for asymmetric cryptographic protocols
2004
Journal of Computer Security
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. ...
a subtype relation; (2) trust effects, to guarantee that tainted data does not, in fact, originate from the opponent; and (3) challenge/response types to support a variety of idioms used to guarantee ...
Conclusions and Further Work This paper presents a type and effect system for asymmetric cryptographic protocols. ...
doi:10.3233/jcs-2004-123-406
fatcat:ignujdcmezdj7kdyvmj7tliiyu
Types and effects for asymmetric cryptographic protocols
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. ...
Like earlier work on types for cryptographic protocols, we take a binary view of the world as consisting of a system of honest protocol participants plus a dishonest opponent. ...
Acknowledgements Thanks to Martín Abadi, Adriana Compagnoni, and Dusko Pavlovic for discussions related to this paper. ...
doi:10.1109/csfw.2002.1021808
dblp:conf/csfw/GordonJ02
fatcat:2sfhsf5xy5aq7ekfpamenqtn4y
Cryptographic protection of classified information in military radio communication faced with threats from quantum computers
2020
Radioelectronic Systems Conference 2019
Cryptographic protocols are used, among others, for authentication and key agreeing. ...
All cryptographic algorithms and protocols need cryptographic data for operating, i.e. keys, passwords, random data, identification data. ...
By creating an array of size ∛N and using the Grover algorithm to find collisions, it is possible to construct an effective quantum attack. ...
doi:10.1117/12.2565467
fatcat:kmwnhryvi5fwbk4py35d6xkkty
Security Frameworks for Wireless Sensor Networks-Review
2012
Procedia Technology - Elsevier
This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled. ...
Due to these well accepted limitations, WSN is not able to deal with traditional cryptographic algorithms. ...
schemes and makes well-known cryptographic protocols more efficient. ...
doi:10.1016/j.protcy.2012.10.119
fatcat:6vmzafrfabhlfa47iy35uhq4zm
Establishment and Application of Cryptographic Library Model
2015
Journal of Computer and Communications
algorithm and protocol, etc. ...
The model can find relevant knowledge for the analysts automatically and rapidly, which is helpful to the learning of the overall abstract structure of cryptology. ...
See Figure 1 for algorithm description: 1. Cryptographic protocol is a combination of complex process and limited function. ...
doi:10.4236/jcc.2015.35003
fatcat:ovnqmdgmwzhx5d7odx5aqjyxui
Encryption algorithms for databases
2010
Annals of Spiru Haret University Economic Series
Whenever shopping is done online, the browser uses cryptographic methods to send to the server the credit card number and private information. ...
Looking at the above, the study of the cryptographic and security methods, as well as finding strong crypto-systems is still a pivotal issue. ...
There are two types of cryptographic systems: • symmetric (secret key) that use the same key, for both encrypting and decrypting the messages; • asymmetric (public key) that use distinct keys for encrypting ...
doaj:a9651cd6c1ff411c8dbb158d62ca68e8
fatcat:ccf4b3hasvby7cqwirpmvlmedy
Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes
2014
International Journal of Information Technology and Computer Science
The symmetric key cryptography schemes require less time for processing, less power and also require less storage space as compared to asymmetric key cryptographic schemes, results in less impact on the ...
In this paper, the different cryptographic schemes based on asymmetric key and symmetric key cryptography are evaluated. ...
The asymmetric key cryptographic schemes require more storage space and time for their processing. ...
doi:10.5815/ijitcs.2014.08.05
fatcat:cx6bgheykfem3ml5ytgi25keju
Increasing Cryptographic Security Using Message Authentication Code (MAC)
2019
International Journal of Engineering and Technology
The study dealt with efficiency and extensive use of the Hash-based Message Authentication Code (HMAC) function in well-known protocols like IP-Sec and SSL and its use in identifying the authenticity of ...
Nowadays, HMAC is widely used in popular security protocols like Ip-Sec, Transport Layer Security (TLS), and Secure Sockets Layer (SSL). ...
an effective step in increasing the security of today's protocols. ...
doi:10.21817/ijet/2019/v11i4/191104073
fatcat:fidjwfbsvvch7mcrwxjpbtjege
Developing and Evaluation of New Hybrid Encryption Algorithms
2014
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. ...
A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. ...
ACKNOWLEDGMENTS This study was supported by Faculty of Computers and Informatics (Menofyia University, Banha University), Egypt ...
doi:10.24297/ijct.v13i1.2926
fatcat:eplpmbjx2jchvkmbrzwb373iwa
Analysis of Cryptographic Algorithms for Network Security
2013
International Journal of Computer Applications Technology and Research
There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques ...
Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together provide the fundamentals for trusted e-commerce and secure communication. ...
Adoption of New Types of Cryptographic Primitives In general, it is it is accepted that a conservative approach to algorithm is best when designing cryptographic protocols; only tried and true algorithms ...
doi:10.7753/ijcatr0302.1009
fatcat:fw4fktu6obda3csmt5zmiunagy
AN APPROACH TO REVAMP THE DATA SECURITY USING CRYPTOGRAPHIC TECHNIQUES
2017
International Journal of Advanced Research in Computer Science
The confidential data could be accessed by the unauthorized user for ill-natured objective. So, it is mandatory to apply effective encryption and decryption methods to reinforce data security. ...
In this review paper, various cryptographic techniques, like Rivest-Shamir-Adleman (RSA), Diffie-Hellman Key Exchange, Elliptic curve cryptography (ECC), Quantum Key Distribution (QKD) and Hybrid Cryptography ...
RSA Encryption is the most widely used asymmetric key encryption system used for electronic commerce protocols.
F. ...
doi:10.26483/ijarcs.v8i7.4284
fatcat:o6tmrrscnzgwlavilqoiblcq6a
A Hybrid Method for Secure Communication and Performance Analysis in VANET
2020
International Journal of Engineering and Advanced Technology
cost, computational cost).In our proposed scheme we use a hybrid approach, which contain ECC algorithm( asymmetric algorithm).ECC algorithm is used for encryption of personal details (i.e. ...
Speed, location, device address) and AES algorithm (symmetric algorithm ) is used for encryption for safety messages along with output of ECC algorithm. ...
Asymmetric Cryptographic Algorithm: Asymmetric Cryptographic Algorithm is that type of cryptographic algorithm that make use of two keys (public and private key) [23] . ...
doi:10.35940/ijeat.e1022.069520
fatcat:crjr5ywdxrgfplml5guop4p4xu
Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication
2020
International Journal of Mathematical Sciences and Computing
In this paper, several hybrid combinations, which combines both symmetric and asymmetric cryptographic techniques to offer high security with minimum key maintenance is presented. ...
This hybrid combination offers several cryptographic primitives such as integrity, confidentiality and authentication, thereby enhancing the security. ...
There are a variety of routing protocols that exist in ANETs and the routing protocols chosen may have an effect on the performance of network [8, 9] . ...
doi:10.5815/ijmsc.2020.04.04
fatcat:jeqpxjhsungo7pqsbidlswsjdm
Lightweight Cryptographic Techniques for Automotive Cybersecurity
2018
Wireless Communications and Mobile Computing
In addition, asymmetric, symmetric, and lightweight cryptographic solutions are summarized. ...
This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms. ...
ARAN uses timestamps for route freshness and asymmetric cryptographic technique for secure route discovery authentication. (2) SEAD: Secure and Efficient Ad hoc Distance (SEAD) vector protocol is based ...
doi:10.1155/2018/1640167
fatcat:nitjuwgn2jffjjdcif5fez7t4u
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
2011
International Journal of Information Security and Privacy
to show the effectiveness of the implementation and that G-Q is a more efficient protocol. ...
Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. ...
Thus, smart cards are portable and small computers with different types of memory. ...
doi:10.4018/jisp.2011070101
fatcat:ayfordumpfb7rnhnzrvb55yeqe
« Previous
Showing results 1 — 15 out of 9,379 results