Filters








9,379 Hits in 2.8 sec

Types and effects for asymmetric cryptographic protocols

Andrew D. Gordon, Alan Jeffrey, S. Schneider
2004 Journal of Computer Security  
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography.  ...  a subtype relation; (2) trust effects, to guarantee that tainted data does not, in fact, originate from the opponent; and (3) challenge/response types to support a variety of idioms used to guarantee  ...  Conclusions and Further Work This paper presents a type and effect system for asymmetric cryptographic protocols.  ... 
doi:10.3233/jcs-2004-123-406 fatcat:ignujdcmezdj7kdyvmj7tliiyu

Types and effects for asymmetric cryptographic protocols

A.D. Gordon, A. Jeffrey
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15  
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography.  ...  Like earlier work on types for cryptographic protocols, we take a binary view of the world as consisting of a system of honest protocol participants plus a dishonest opponent.  ...  Acknowledgements Thanks to Martín Abadi, Adriana Compagnoni, and Dusko Pavlovic for discussions related to this paper.  ... 
doi:10.1109/csfw.2002.1021808 dblp:conf/csfw/GordonJ02 fatcat:2sfhsf5xy5aq7ekfpamenqtn4y

Cryptographic protection of classified information in military radio communication faced with threats from quantum computers

Robert Wicik, Mariusz Borowski, Piotr Kaniewski, Jan Matuszewski
2020 Radioelectronic Systems Conference 2019  
Cryptographic protocols are used, among others, for authentication and key agreeing.  ...  All cryptographic algorithms and protocols need cryptographic data for operating, i.e. keys, passwords, random data, identification data.  ...  By creating an array of size ∛N and using the Grover algorithm to find collisions, it is possible to construct an effective quantum attack.  ... 
doi:10.1117/12.2565467 fatcat:kmwnhryvi5fwbk4py35d6xkkty

Security Frameworks for Wireless Sensor Networks-Review

Gaurav Sharma, Suman Bala, Anil K. Verma
2012 Procedia Technology - Elsevier  
This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled.  ...  Due to these well accepted limitations, WSN is not able to deal with traditional cryptographic algorithms.  ...  schemes and makes well-known cryptographic protocols more efficient.  ... 
doi:10.1016/j.protcy.2012.10.119 fatcat:6vmzafrfabhlfa47iy35uhq4zm

Establishment and Application of Cryptographic Library Model

Tie-Ming Liu, Lie-Hui Jiang, Jing Jing, Yuan-Yuan Zhang
2015 Journal of Computer and Communications  
algorithm and protocol, etc.  ...  The model can find relevant knowledge for the analysts automatically and rapidly, which is helpful to the learning of the overall abstract structure of cryptology.  ...  See Figure 1 for algorithm description: 1. Cryptographic protocol is a combination of complex process and limited function.  ... 
doi:10.4236/jcc.2015.35003 fatcat:ovnqmdgmwzhx5d7odx5aqjyxui

Encryption algorithms for databases

Doina FUSARU, Mariuţa ŞERBAN
2010 Annals of Spiru Haret University Economic Series  
Whenever shopping is done online, the browser uses cryptographic methods to send to the server the credit card number and private information.  ...  Looking at the above, the study of the cryptographic and security methods, as well as finding strong crypto-systems is still a pivotal issue.  ...  There are two types of cryptographic systems: • symmetric (secret key) that use the same key, for both encrypting and decrypting the messages; • asymmetric (public key) that use distinct keys for encrypting  ... 
doaj:a9651cd6c1ff411c8dbb158d62ca68e8 fatcat:ccf4b3hasvby7cqwirpmvlmedy

Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes

Er. Gurjot Singh, Er. Sandeep Kaur Dhanda
2014 International Journal of Information Technology and Computer Science  
The symmetric key cryptography schemes require less time for processing, less power and also require less storage space as compared to asymmetric key cryptographic schemes, results in less impact on the  ...  In this paper, the different cryptographic schemes based on asymmetric key and symmetric key cryptography are evaluated.  ...  The asymmetric key cryptographic schemes require more storage space and time for their processing.  ... 
doi:10.5815/ijitcs.2014.08.05 fatcat:cx6bgheykfem3ml5ytgi25keju

Increasing Cryptographic Security Using Message Authentication Code (MAC)

Seyyed Mehdi Mousavi, Dr.Mohammad Hossein Shakour
2019 International Journal of Engineering and Technology  
The study dealt with efficiency and extensive use of the Hash-based Message Authentication Code (HMAC) function in well-known protocols like IP-Sec and SSL and its use in identifying the authenticity of  ...  Nowadays, HMAC is widely used in popular security protocols like Ip-Sec, Transport Layer Security (TLS), and Secure Sockets Layer (SSL).  ...  an effective step in increasing the security of today's protocols.  ... 
doi:10.21817/ijet/2019/v11i4/191104073 fatcat:fidjwfbsvvch7mcrwxjpbtjege

Developing and Evaluation of New Hybrid Encryption Algorithms

DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed
2014 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques.  ...  A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed.  ...  ACKNOWLEDGMENTS This study was supported by Faculty of Computers and Informatics (Menofyia University, Banha University), Egypt  ... 
doi:10.24297/ijct.v13i1.2926 fatcat:eplpmbjx2jchvkmbrzwb373iwa

Analysis of Cryptographic Algorithms for Network Security

Kritika Acharya, Manisha Sajwan, Sanjay Bhargava
2013 International Journal of Computer Applications Technology and Research  
There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques  ...  Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together provide the fundamentals for trusted e-commerce and secure communication.  ...  Adoption of New Types of Cryptographic Primitives In general, it is it is accepted that a conservative approach to algorithm is best when designing cryptographic protocols; only tried and true algorithms  ... 
doi:10.7753/ijcatr0302.1009 fatcat:fw4fktu6obda3csmt5zmiunagy

AN APPROACH TO REVAMP THE DATA SECURITY USING CRYPTOGRAPHIC TECHNIQUES

Chakshu Diwan
2017 International Journal of Advanced Research in Computer Science  
The confidential data could be accessed by the unauthorized user for ill-natured objective. So, it is mandatory to apply effective encryption and decryption methods to reinforce data security.  ...  In this review paper, various cryptographic techniques, like Rivest-Shamir-Adleman (RSA), Diffie-Hellman Key Exchange, Elliptic curve cryptography (ECC), Quantum Key Distribution (QKD) and Hybrid Cryptography  ...  RSA Encryption is the most widely used asymmetric key encryption system used for electronic commerce protocols. F.  ... 
doi:10.26483/ijarcs.v8i7.4284 fatcat:o6tmrrscnzgwlavilqoiblcq6a

A Hybrid Method for Secure Communication and Performance Analysis in VANET

2020 International Journal of Engineering and Advanced Technology  
cost, computational cost).In our proposed scheme we use a hybrid approach, which contain ECC algorithm( asymmetric algorithm).ECC algorithm is used for encryption of personal details (i.e.  ...  Speed, location, device address) and AES algorithm (symmetric algorithm ) is used for encryption for safety messages along with output of ECC algorithm.  ...  Asymmetric Cryptographic Algorithm: Asymmetric Cryptographic Algorithm is that type of cryptographic algorithm that make use of two keys (public and private key) [23] .  ... 
doi:10.35940/ijeat.e1022.069520 fatcat:crjr5ywdxrgfplml5guop4p4xu

Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication

Zuhi Subedar, Belagavi, Karnataka,India, Araballi Ashwini, Belagavi, Karnataka,India
2020 International Journal of Mathematical Sciences and Computing  
In this paper, several hybrid combinations, which combines both symmetric and asymmetric cryptographic techniques to offer high security with minimum key maintenance is presented.  ...  This hybrid combination offers several cryptographic primitives such as integrity, confidentiality and authentication, thereby enhancing the security.  ...  There are a variety of routing protocols that exist in ANETs and the routing protocols chosen may have an effect on the performance of network [8, 9] .  ... 
doi:10.5815/ijmsc.2020.04.04 fatcat:jeqpxjhsungo7pqsbidlswsjdm

Lightweight Cryptographic Techniques for Automotive Cybersecurity

Ahmer Khan Jadoon, Licheng Wang, Tong Li, Muhammad Azam Zia
2018 Wireless Communications and Mobile Computing  
In addition, asymmetric, symmetric, and lightweight cryptographic solutions are summarized.  ...  This article presents a survey about developments in vehicular networks from the perspective of lightweight cryptographic protocols and privacy preserving algorithms.  ...  ARAN uses timestamps for route freshness and asymmetric cryptographic technique for secure route discovery authentication. (2) SEAD: Secure and Efficient Ad hoc Distance (SEAD) vector protocol is based  ... 
doi:10.1155/2018/1640167 fatcat:nitjuwgn2jffjjdcif5fez7t4u

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card

Ahmed Patel, Kenan Kalajdzic, Laleh Golafshan
2011 International Journal of Information Security and Privacy  
to show the effectiveness of the implementation and that G-Q is a more efficient protocol.  ...  Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space.  ...  Thus, smart cards are portable and small computers with different types of memory.  ... 
doi:10.4018/jisp.2011070101 fatcat:ayfordumpfb7rnhnzrvb55yeqe
« Previous Showing results 1 — 15 out of 9,379 results