• No results found

cryptographic key management

Cryptographic Key Management

Cryptographic Key Management

... centralised cryptographic key management administration is needed, this does not mean a single key manager administrator with access to every piece of information, but actually a key ...

22

New Cryptographic Key Management for Smart Grid

New Cryptographic Key Management for Smart Grid

... new cryptographic key management ...of cryptographic key management, given the limited capacity of the metering devices, came closest to reaching the optimal attributes we had ...

53

A Draft Framework for Designing Cryptographic Key Management Systems

A Draft Framework for Designing Cryptographic Key Management Systems

... CKMS Design for USG Applications Framework Components USG Security Requirements Documentation CKMS PROFILE C 1.?. Framework Limitations.[r] ...

35

CRYPTOGRAPHIC KEY MANAGEMENT PRINCIPLES APPLIED IN SOUTH AFRICAN INTERNET BANKING

CRYPTOGRAPHIC KEY MANAGEMENT PRINCIPLES APPLIED IN SOUTH AFRICAN INTERNET BANKING

... the key life cycle controls associated with public keys opposed to private keys are much ...for key distribution and loading, where public keys can be distributed to multiple parties without any concern for ...

12

On Energy Optimization in Cryptographic Hash Functions and Symmetric Key Protocols

On Energy Optimization in Cryptographic Hash Functions and Symmetric Key Protocols

... The experiments were run on a Mac note book with 4 Intel cores, each of which operates at a frequency of 2 GHz. The laptop has 4GB DDR3 memory with 8 banks and is running Mac OS X Lion 10.7.3. The sizes of L2 Cache (per ...

15

Analyzing the speed of combined cryptographic algorithms with secret and public key

Analyzing the speed of combined cryptographic algorithms with secret and public key

... Data security is an essential part of an organization; it can be achieved by the using various methods. In order to maintain and upgrade the model still efforts are required and increase the marginally overheads. The ...

7

A Recent Study of Various Symmetric Key Based Cryptographic Methods

A Recent Study of Various Symmetric Key Based Cryptographic Methods

... In 2012 Monika Agrawal, Pradeep Mishra proposed “A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm” They presented a new approach for data encryption based on Blowfish algorithm. The ...

7

Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms

Comparison of Time Complexity of Symmetric and Asymmetric Key Cryptographic Algorithms

... 4) Second Snapshot: The snapshot shown below shows the screen of software which shows the comparison of algorithms. After clicking the Compare button a text comes which shows the algorithm having better time complexity. ...

5

A NOVEL ALGORITHM FOR CRYPTOGRAPHIC KEY GENERATION BASED ON SESSION AND STEGNOGRAPHY

A NOVEL ALGORITHM FOR CRYPTOGRAPHIC KEY GENERATION BASED ON SESSION AND STEGNOGRAPHY

... a key that is generated from color image and the difference in the LSB of the image ...This key is used to encrypt and decrypt the messages that are exchanged between the sender and ...the key varies ...

6

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

... symmetric key algorithms, asymmetric key algorithms and message digest ...asymmetric key and symmetric key differs from each other by number of ...Single key is used in the symmetric ...

5

Deniable Key Exchange for Privacy Preservation in ON-LINE Shopping

Deniable Key Exchange for Privacy Preservation in ON-LINE Shopping

... Internet Key Exchange is the protocol used to set up a security association (SA) in the IPsec protocol ...Internet Key-Exchange Protocols are the main cryptographic protocols that are used to achieve ...

5

Network Security Issues and Cryptography

Network Security Issues and Cryptography

... for key exchange, digital signatures, or encryption of small blocks of ...size key. The key-pair is derived from a very large number, n, that is the product of two prime numbers chosen according to ...

6

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

... general cryptographic use. Utilizing a tree structure, a key Using KAC for data sharing in cloud ...master-secret key to avoid confusion with the delegated key we will explain ...master-secret ...

5

An Efficient Method for Secure ECG Feature based Cryptographic Key Generation

An Efficient Method for Secure ECG Feature based Cryptographic Key Generation

... crypto-graphic key production techniques are ...suggested cryptographic key generation using many ECG ...the key production implementation times and offer high level of safety ...the ...

6

A Steganography LSB technique for hiding Image within Image Using blowfish Encryption Algorithm

A Steganography LSB technique for hiding Image within Image Using blowfish Encryption Algorithm

... Other study by(Karim 2011) introduces a best approach for Least Significant Bit (LSB) based on image steganography that enhances the existing LSB substitution techniques to improve the security level of hidden ...

6

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

... Cryptographic Algorithm Validation Program (CAVP)  Operated by NIST's Security Management &. Assurance group[r] ...

20

Database Security with Access Control and Assured Deletion Using Cryptographic Key

Database Security with Access Control and Assured Deletion Using Cryptographic Key

... ABSTRACT: The outsource information reinforcements off-site to outsider distributed storage benefits in order to decrease information administration costs. Be that as it may, the maker of cloud must give security ...

10

Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS

Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS

... Among challenging topics in WSNs, security certainly drives many issues. However, it is frequently claimed that standard security mechanisms are prohibitive in WSNs because they implicate in the extensive use of scarce ...

12

Cryptographic Key Exchange using Dual Tone Multi Frequency Generator

Cryptographic Key Exchange using Dual Tone Multi Frequency Generator

... new key exchange technique, DTMFG key exchange, has been introduced for efficient and secure key exchange between two ...DTMFG key exchange technique used the DTMF for the purpose of ...

8

Key Management With Cryptography

Key Management With Cryptography

... public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored ...public key cryptography and identity-based(ID- based)cryptography ...public key cryptography ...

6

Show all 10000 documents...

Related subjects