Kalyani et al., 2017 - Google Patents
STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY'S SECURE WORLD.Kalyani et al., 2017
- Document ID
- 8398826120182642332
- Author
- Kalyani D
- Vijay P
- Publication year
- Publication venue
- International Journal of Advanced Research in Computer Science
External Links
Snippet
Nowadays every communication and data exchange has been digitized. So everyone thinks about privacy and security. In this paper, we are highlighting the need for security in daily data transmissions and the role of cryptography in order to handle demands of today's …
- 238000000034 method 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Smart | Identity-based authenticated key agreement protocol based on Weil pairing | |
US20090041233A1 (en) | Certificate-based encryption and public key infrastructure | |
Anand et al. | Identity-based cryptography techniques and applications (a review) | |
CN104301108A (en) | Signcryption method based from identity environment to certificateless environment | |
Khasawneh et al. | ECS‐CP‐ABE: A lightweight elliptic curve signcryption scheme based on ciphertext‐policy attribute‐based encryption to secure downlink multicast communication in edge envisioned advanced metering infrastructure networks | |
Braeken et al. | Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage | |
CN106453253B (en) | A kind of hideing for efficient identity-based signs decryption method | |
GB2543359A (en) | Methods and apparatus for secure communication | |
Al-Janabi et al. | Combining Mediated and Identity-Based Cryptography for Securing E-Mail. | |
Al Housani et al. | Survey on certificateless public key cryptography | |
Nayak | A secure ID-based signcryption scheme based on elliptic curve cryptography | |
Doshi | An enhanced approach for CP-ABE with proxy re-encryption in IoT paradigm | |
Kalyani et al. | STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY'S SECURE WORLD. | |
Bai | Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE) | |
Ullah et al. | An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing | |
JP2010113181A (en) | Key management method, key generation method, encryption processing method, decryption processing method, access control method, communication network system | |
Das et al. | An elliptic curve based signcryption protocol using java | |
Omono et al. | Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds | |
Ricci et al. | Privacy-enhancing group signcryption scheme | |
Anusree et al. | A security framework for brokerless publish subscribe system using identity based signcryption | |
Elashry et al. | Identity-based mediated RSA revisited | |
JP3862397B2 (en) | Information communication system | |
Shareef et al. | Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA–ECDH) | |
Das et al. | Cryptanalysis of Signcryption Protocols Based On Elliptic Curve | |
Indla et al. | Extended Group Key Transfer Protocol for Authentication Using DES based on Secret Sharing in Cloud |