Results 21 to 30 of about 2,989,875 (336)

Remarks on a Tropical Key Exchange System [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
Abstract We consider a key-exchange protocol based on matrices over a tropical semiring which was recently proposed in [2]. We show that a particular private parameter of that protocol can be recovered with a simple binary search, rendering it insecure.
Chris Monico, Dylan Rudy
openaire   +4 more sources

Public Key Exchange Using Matrices Over Group Rings [PDF]

open access: yes, 2013
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform.
Kahrobaei, Delaram   +2 more
core   +2 more sources

On Wireless Channel Parameters for Key Generation in Industrial Environments

open access: yesIEEE Access, 2018
The advent of industry 4.0 with its idea of individualized mass production will significantly increase the demand for more flexibility on the production floor.
Dan Kreiser   +6 more
doaj   +1 more source

Non-Commutative Key Exchange Protocol

open access: yes, 2021
We introduce a novel key exchange protocol based on non-commutative matrix multiplication. The security of our method does not rely on computational problems as integer factorization or discrete logarithm whose difficulty is conjectured. We claim that the unique opportunity for the eavesdropper to get the private key is by means of an exhaustive search
Luis Adrián Lizama-Pérez   +1 more
openaire   +4 more sources

SIKM – a smart cryptographic key management framework

open access: yesOpen Computer Science, 2022
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management.
Chaeikar Saman Shojae   +3 more
doaj   +1 more source

RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones

open access: yesIEEE Access, 2022
The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to the Internet of Things-supported drone networks (IoD), thereby enabling smooth communication among devices and applications,
Muhammad Tanveer   +5 more
doaj   +1 more source

Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]

open access: yesEngineering and Technology Journal, 2014
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab   +2 more
doaj   +1 more source

Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality

open access: yesIEEE Access, 2022
Public-key encryption is extensively used to provide digital data confidentiality and deliver the security features, such as nonrepudiation (digital signature) and secure key exchange.
Muhammad Waseem Hafiz   +4 more
doaj   +1 more source

Heisenberg Groups as Platform for the AAG key-exchange protocol [PDF]

open access: yes, 2014
Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by ...
Kahrobaei, Delaram, Lam, Ha T.
core   +1 more source

Key exchange protocol based on the private key [PDF]

open access: yesAdvances in Intelligent Systems Research, 2015
At present, most existing key exchange protocols for three-party (3pake) are easily attacked by server key disclosure, dictionary attack and so on. This paper analyses the weakness of the previous work , and presents a key exchange for three-party based on the private key .This method can resist common attack through safety analysis, and the efficiency
Wenqian Shang, Tong Yi, Minyong Shi
openaire   +2 more sources

Home - About - Disclaimer - Privacy