Results 21 to 30 of about 2,989,875 (336)
Remarks on a Tropical Key Exchange System [PDF]
Abstract We consider a key-exchange protocol based on matrices over a tropical semiring which was recently proposed in [2]. We show that a particular private parameter of that protocol can be recovered with a simple binary search, rendering it insecure.
Chris Monico, Dylan Rudy
openaire +4 more sources
Public Key Exchange Using Matrices Over Group Rings [PDF]
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices over a group ring of a (small) symmetric group as the platform.
Kahrobaei, Delaram +2 more
core +2 more sources
On Wireless Channel Parameters for Key Generation in Industrial Environments
The advent of industry 4.0 with its idea of individualized mass production will significantly increase the demand for more flexibility on the production floor.
Dan Kreiser +6 more
doaj +1 more source
Non-Commutative Key Exchange Protocol
We introduce a novel key exchange protocol based on non-commutative matrix multiplication. The security of our method does not rely on computational problems as integer factorization or discrete logarithm whose difficulty is conjectured. We claim that the unique opportunity for the eavesdropper to get the private key is by means of an exhaustive search
Luis Adrián Lizama-Pérez +1 more
openaire +4 more sources
SIKM – a smart cryptographic key management framework
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management.
Chaeikar Saman Shojae +3 more
doaj +1 more source
RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones
The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to the Internet of Things-supported drone networks (IoD), thereby enabling smooth communication among devices and applications,
Muhammad Tanveer +5 more
doaj +1 more source
Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab +2 more
doaj +1 more source
Public-key encryption is extensively used to provide digital data confidentiality and deliver the security features, such as nonrepudiation (digital signature) and secure key exchange.
Muhammad Waseem Hafiz +4 more
doaj +1 more source
Heisenberg Groups as Platform for the AAG key-exchange protocol [PDF]
Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by ...
Kahrobaei, Delaram, Lam, Ha T.
core +1 more source
Key exchange protocol based on the private key [PDF]
At present, most existing key exchange protocols for three-party (3pake) are easily attacked by server key disclosure, dictionary attack and so on. This paper analyses the weakness of the previous work , and presents a key exchange for three-party based on the private key .This method can resist common attack through safety analysis, and the efficiency
Wenqian Shang, Tong Yi, Minyong Shi
openaire +2 more sources

