[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kalyani et al., 2017 - Google Patents

STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY'S SECURE WORLD.

Kalyani et al., 2017

Document ID
8398826120182642332
Author
Kalyani D
Vijay P
Publication year
Publication venue
International Journal of Advanced Research in Computer Science

External Links

Snippet

Nowadays every communication and data exchange has been digitized. So everyone thinks about privacy and security. In this paper, we are highlighting the need for security in daily data transmissions and the role of cryptography in order to handle demands of today's …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Smart Identity-based authenticated key agreement protocol based on Weil pairing
US20090041233A1 (en) Certificate-based encryption and public key infrastructure
Anand et al. Identity-based cryptography techniques and applications (a review)
CN104301108A (en) Signcryption method based from identity environment to certificateless environment
Khasawneh et al. ECS‐CP‐ABE: A lightweight elliptic curve signcryption scheme based on ciphertext‐policy attribute‐based encryption to secure downlink multicast communication in edge envisioned advanced metering infrastructure networks
Braeken et al. Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage
CN106453253B (en) A kind of hideing for efficient identity-based signs decryption method
GB2543359A (en) Methods and apparatus for secure communication
Al-Janabi et al. Combining Mediated and Identity-Based Cryptography for Securing E-Mail.
Al Housani et al. Survey on certificateless public key cryptography
Nayak A secure ID-based signcryption scheme based on elliptic curve cryptography
Doshi An enhanced approach for CP-ABE with proxy re-encryption in IoT paradigm
Kalyani et al. STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY'S SECURE WORLD.
Bai Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE)
Ullah et al. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
JP2010113181A (en) Key management method, key generation method, encryption processing method, decryption processing method, access control method, communication network system
Das et al. An elliptic curve based signcryption protocol using java
Omono et al. Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds
Ricci et al. Privacy-enhancing group signcryption scheme
Anusree et al. A security framework for brokerless publish subscribe system using identity based signcryption
Elashry et al. Identity-based mediated RSA revisited
JP3862397B2 (en) Information communication system
Shareef et al. Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA–ECDH)
Das et al. Cryptanalysis of Signcryption Protocols Based On Elliptic Curve
Indla et al. Extended Group Key Transfer Protocol for Authentication Using DES based on Secret Sharing in Cloud