Explore chapters and articles related to this topic
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Cryptographic system or cryptosystem is a suite of cryptographic algorithms, keys, and key management protocols for securing the message traveling over the unsecure networks between the entities. The cryptographic algorithms ensure the secrecy, privacy, and authenticity of the communicated message between the entities. It involves ciphers, keys, plaintext, and ciphertext for the encryption of the message. There are two types of cryptography algorithms in the cryptographic system: symmetric (secret key) and asymmetric (public key) cryptography algorithms. Symmetric key cryptography uses the same key commonly known as the secret key for the encryption and decryption of the message, whereas asymmetric key cryptography algorithm uses public and private keys for the encryption and decryption of the message. Hence, there are three types of keys involved in the cryptographic algorithm: secret key, private key, and public key for ensuring the secrecy of the message over the unsecured networks. For ensuring the secrecy of the message, cryptographic keys must be managed efficiently and is done by key management system.
Machine identities
Published in Abbas Moallem, Human-Computer Interaction and Cybersecurity Handbook, 2018
We introduced the notion of “symmetric keys” as part of the discussion on cryptographic protocols in the previous section. Unlike asymmetric key encryption where there are separate public and private keys, symmetric key algorithms use the same keys for both encryption and decryption. Symmetric keys are preferred over asymmetric keys as they offer better encryption performance, yet have the requirement of both parties in a transaction needing access to the (same) symmetric key. It is for this reason that symmetric keys are typically used to secure data at rest—disk encryption, file encryption, database encryption, etc. To secure data in motion, symmetric key encryption is used (to encrypt the data) in conjunction with asymmetric key pairs (to authenticate the participants and encrypt the symmetric key used for a session).
Very-Large-Scale Integration Implementations of Cryptographic Algorithms
Published in Tomasz Wojcicki, Krzysztof Iniewski, VLSI: Circuits for Emerging Applications, 2017
A stream cipher is a symmetric key encryption algorithm where plaintext digits are combined with a pseudorandom keystream generated by the stream cipher. In a stream cipher, each plaintext bit or byte or block of any size is encrypted one at a time with the corresponding bit or byte or block of the keystream, to give the corresponding bit or byte or block of the ciphertext stream. Usually, the message stream is combined with the keystream with a bitwise exclusive-or (XOR) operation. The pseudorandom keystream is typically generated serially from a random seed value that serves as the key of the stream cipher. Many stream cipher algorithms are designed by combining the outputs of several independent Linear Feedback Shift Registers (LFSRs) using a nonlinear Boolean function. The VLSI area used in implementing such stream cipher systems has two components: the area used to implement the LFSRs and the area used to implement the Boolean function. The area required to implement the LFSRs is proportional to the product of the length of the LFSR and the number of inputs to the LFSR, whereas the area required to implement the Boolean function grows exponentially with the number of inputs. Thus, implementing the Boolean function is a main hurdle in this case.
Ensemble-based cryptography for soldiers’ health monitoring using mobile ad hoc networks
Published in Automatika, 2023
B. V. V. Siva Prasad, Sridhar Mandapati, Lakshmana Kumar Ramasamy, Rajasekhar Boddu, Pranayanath Reddy, B. Suresh Kumar
In symmetric-key encryption, the same key is used for both the encryption and the decryption process. The source wants to send the packet to the destination. Therefore, the source wants to encrypt the packet using symmetric key encryption against unauthorized access. So first, it wants to create a secret key based on the key generation phase. This secret key is utilized for both encryptions with decryption. A key represents any code that provides plain text when applied to ciphertext—both the sender and the recipient share this key. If the key is revealed, the confidentiality of the data is compromised. The key is known to the sender and the receiver; hence, it does not protect the sender from the receiver forging a message and claiming the sender sends it. Longer keys are used to increase security and reduce the chances of recognizing the key by brute force. It is relatively fast because it utilizes a similar key for encryption also decryption. The proposed cryptographic ensemble approach used the RC4 algorithm for symmetric key encryption.
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Published in Cybernetics and Systems, 2023
Ozgu Can, Fursan Thabit, Asia Othman Aljahdali, Sharaf Al-Homdy, Hoda A. Alkhzaimi
Data security is represented by cryptography, which is an essential tool (algorithms) in security. The primary function of cryptography algorithms is to make secure communication possible in the face of adversaries or harmful outside parties. Encryption turns an input (i.e., plaintext) into an encrypted output using an algorithm and a key (i.e., cipher text). The type of cryptography includes symmetric key encryption methods with two forms (a) Stream cipher and (b) Block cipher. A block cipher uses a single data block. The plain text or message is broken down into blocks; each is operated separately using a key and a cryptographic mechanism.The stream cipher enables algorithms to perform encryption and decryption of shared data using a symmetric key mechanism.Requirement of Security: The essential requirement of confidentiality, availability, and integrity is defined as follows:
Efficient Key Generation Techniques for Securing IoT Communication Protocols
Published in IETE Technical Review, 2021
Amol K. Boke, Sangeeta Nakhate, Arvind Rajawat
This mode overcomes the problem faced by the ECB mode of repeating cipher text for the same plain text. The third method is Cipher Feedback Mode (CBF) in which cipher itself is given as feedback with some modification. The fourth mode is Output Feedback Mode (OFB) where encrypted data are given as feedback instead of cipher. The fifth and last mode is the Counter Mode where every step has a different counter and it does not depend on any feedback value. Examples of block cipher are given in Figure 3 out of which AES (Advanced Encryption Standards) is considered as one of the most secure symmetric key cryptographic algorithms. While there is only one key that does the encryption and decryption, symmetric key cryptographic algorithms are more suitable for those applications where the key does not need to be shared over the network.