Explore chapters and articles related to this topic
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Cryptographic system or cryptosystem is a suite of cryptographic algorithms, keys, and key management protocols for securing the message traveling over the unsecure networks between the entities. The cryptographic algorithms ensure the secrecy, privacy, and authenticity of the communicated message between the entities. It involves ciphers, keys, plaintext, and ciphertext for the encryption of the message. There are two types of cryptography algorithms in the cryptographic system: symmetric (secret key) and asymmetric (public key) cryptography algorithms. Symmetric key cryptography uses the same key commonly known as the secret key for the encryption and decryption of the message, whereas asymmetric key cryptography algorithm uses public and private keys for the encryption and decryption of the message. Hence, there are three types of keys involved in the cryptographic algorithm: secret key, private key, and public key for ensuring the secrecy of the message over the unsecured networks. For ensuring the secrecy of the message, cryptographic keys must be managed efficiently and is done by key management system.
Very-Large-Scale Integration Implementations of Cryptographic Algorithms
Published in Tomasz Wojcicki, Krzysztof Iniewski, VLSI: Circuits for Emerging Applications, 2017
Today secure storage and transfer of information as well as communication over Internet and mobile networks has become very critical. Cryptographic algorithms have been developed to provide various security services such as confidentiality, user authentication, data origin authentication, data integrity, nonrepudiation, privacy, and so on. Cryptographic algorithms are divided into two categories: symmetric-key or secret-key algorithms and asymmetric-key or public-key algorithms. Symmetric-key cryptography refers to cryptographic mechanisms in which both the sender and receiver share the same key or keys that are related in an easily computable way. In asymmetric-key cryptography, two different but mathematically related keys (not in an easily computable way) called public and private keys are used. A public-key cryptosystem is constructed in such a way that calculation of the private key is computationally infeasible from the public key.
Security and Privacy Aspects in the Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Published in Amit Kumar Tyagi, Niladhuri Sreenath, Handbook of Research of Internet of Things and Cyber-Physical Systems, 2022
Riral S. Trivedi, Sankita J. Patel
In asymmetric key cryptography, public keys are the known keys shared between communicating parties while private keys are kept secret. Public key algorithms hold various secure key sharing and key agreement protocols such as RSA, Diffie-Hellman (DH) key exchange, elliptic curve cryptography (ECC), digital signatures algorithm, elgamal, paillier cryptosystem, etc. These techniques suffer from heavy weight mathematical calculations such as modulus, large prime numbers, and bilinear pairing operations which make them unsuitable for resource limited environments. As such, both the discussed approaches have their own advantages and disadvantages. Optimum cryptographic solution to support resource constraints and robust security remains in infancy.
Efficient Key Generation Techniques for Securing IoT Communication Protocols
Published in IETE Technical Review, 2021
Amol K. Boke, Sangeeta Nakhate, Arvind Rajawat
In asymmetric key cryptographic algorithms, there are two types of keys: Public Key and Private Key. Each of the sender and receiver has their own private key and each other's public key. When the sender sends data it but before sending it he encrypts data with the receiver's public key and when the receiver receives data, he decrypts the data with the receiver's private key. Examples of asymmetric key cryptographic algorithms are given in Figure 3 out of which RSA and ECC (Elliptic Curve Cryptography) are widely used algorithms. Actually, the key size of RSA is quite large as compared to AES for a similar level of encryption. Hence ECC is preferred over RSA, as ECC could give the same level of encryption in very less sized key. Keyless Cryptographic Algorithms
FPGA implementation of hardware architecture with AES encryptor using sub-pipelined S-box techniques for compact applications
Published in Automatika, 2020
C. Arul Murugan, P. Karthigaikumar, Sridevi Sathya Priya
In the current revolutionary world, up-gradation in technology has been huge and it continues to control various operations in our day-to-day life. Thus, the eagerness of invention is now turned towards the efficient use of energy and resources. Hence, in most of the electronic applications, low power and security have become an emphasizing consideration similar to the performance of the system. However, maintaining network security is still challenging due to the progression of the internet as it is a highly preferred medium of communication in everyday tasks involving communication and transactions in government agencies, businesses, individuals, etc. This has become an added advantage for the hackers and cybercriminals to access unauthorized information easily. This leads to the evolution of modern cryptography techniques to ensure integrity, authentication and confidentiality of data transmission. In cryptography, the process of translating the user data into an undecipherable format by using several cryptographic algorithms is called encryption. It acts as a secured layer and the data can be read-only by the authorized person who owns the knowledge about the key.
Ensemble-based cryptography for soldiers’ health monitoring using mobile ad hoc networks
Published in Automatika, 2023
B. V. V. Siva Prasad, Sridhar Mandapati, Lakshmana Kumar Ramasamy, Rajasekhar Boddu, Pranayanath Reddy, B. Suresh Kumar
To protect the health parameter information of soldiers from enemies during data transmission cryptography technique is needed. The use of codes to secure information and communications in such a way that only the intended recipients can decipher and process them is known as cryptography. Hence, information access by unauthorized parties is prevented. In the age of computers, cryptography is frequently associated with the conversion of plain text into ciphertext, which is the text that can only be decoded by the intended recipient. This process is known as encryption. Decryption is the process of converting encrypted text into plain text.