Explore chapters and articles related to this topic
High-Performance Switch/Routers
Published in James Aweya, Designing Switch/Routers, 2023
This is the method to be used for SSH server authentication. The key exchange process also sets up the keys that will be used to secure the SSH connection. The key exchange method specifies the process that both parties go through to generate one-time session keys that are to be used for authentication and encryption, and how the server authentication is performed. SSH binds each session key to a session by including randomly generated session-specific data in the hash used to generate the session key. For each session or connection, SSH uses a key exchange algorithm for generating unique keys. A typical key exchange algorithm is the Diffie-Hellman algorithm [RFC4419] which can be used to generate a shared secret key that is only known to the communicating parties.
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Key exchange or key establishment in the cryptosystem is the method of exchanging keys between the communicating entities for secure communication, by using cryptographic key exchange algorithms. Broadly, key establishment protocols are divided into two types: key transport protocol, in which key created by one entity is transported to other communicating entity, and the second is key exchange protocols, in which keys are created by the joint effort of the communicating entities and are exchanged between them (Law et al., 2003). The keys can be exchanged in two ways—either in-band or out-of-band. In in-band key exchange, key is exchanged between the entities through the same communication channel in which the entities are communicating and encryption is taking place, whereas in out-of-band key exchange method, keys are exchanged through the channel other than the channel by which they are communicating, i.e., the channel that they use for encryption (Dulaney and Easttom, 2017). Key exchange is an important part of the key management system and is constantly explored by the researchers. This section discusses various popular key exchange methods, and more discussions can be found in subsequent subsections.
Mars Surface Exploration via Unmanned Aerial Vehicles
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Manjula Sharma, Akshita Gupta, Sachin Kumar Gupta
As a consequence, the idea of cryptography is taken into consideration. The master key encrypts the sub-master key, which in turn encrypts the session and channel keys throughout the drone communication phases [30]. The sub-master, the session, and the channel keys are all delivered through key exchange messages. Since encryption and authentication are used to secure the communication system, the protection of the key exchange message is the most important aspect. Key exchange messages are transferred first in the channel during initialization, followed by the transmission of the sub-master key, channel key, and first session key to the drone [31].
Fuzzy based hybrid BAT and firefly algorithm for optimal path selection and security in wireless sensor network
Published in Automatika, 2023
P. Dinesh Kumar, K. Valarmathi
In this research work, for secure path selection, the system proposes a novel fuzzy-based optimal path selection with randomness (FPS-R) to ensure the effective transmission of data. For an effective path selection, a newly formed hybrid firefly and bat algorithm (H-FBA) is developed. The system depends on asymmetric key generation and key exchange using Elliptic curve cryptography (ECC) combined with the Diffie-Hellman technique for providing maximum security. For data encryption, the system utilized ECC which provides integrity, authenticity, and confidentiality. The system uses a no-assumption-based methodology and relies on randomness and cryptographic algorithms to increase its complexity without compromising on security. A unique seed value is generated for each node that has no relevance to its neighbors. As no information is generated in common among sensor nodes, a compromised node produces no effect on its neighboring nodes. A detailed description of the proposed study is shown in below Figure 1.
Energy Efficient Lightweight Cryptography Algorithms for IoT Devices
Published in IETE Journal of Research, 2022
Tarun Kumar Goyal, Vineet Sahula, Deepak Kumawat
In Section 4, we have presented the architecture of ECDH. A hardware implementation of ECDH was too much costly area-wise, compared to software implementation. In ECDH architecture, a lot of area (million number of gates) is consumed by multiplier and modulus of fractional number. According to requirements of low area and high throughput, efficient multiplier could be used like Booth's, Wallace tree, systolic array multiplier. Similarly, we have tried to get an efficient solution for modulus of fractional number. However, our design wasn't as efficient as PRESENT scheme. Nevertheless, ECDH was found to be fast and efficient compared to other asymmetric algorithms, viz. RSA and DH. Diffie–Hellman key exchange algorithm, Rivest–Shamir–Adleman (RSA) algorithm, and Elliptic curve Diffie–Hellman (ECDH) algorithm were implemented. The dynamic power dissipated is generally classified as a sum of the internal power and switching power. Using PrimeTime (Synopsys), the computed total dynamic power [4] for three of these algorithms is shown in Figure 10.
Protection of COVID-19 images using multiple elliptic curve cryptography
Published in The Imaging Science Journal, 2023
Diana Laishram, N. Tuturaja Singh, Khumanthem Manglem Singh
A secret key is exchanged between the sender (say Alice) and the receiver (say Bob) based on elliptic curve-based Diffie–Hellman Key Exchange (ECDHKE). Alice and Bob together agree on a point such that the subgroup generated by has large order . The algorithm is detailed as follows: