Explore chapters and articles related to this topic
Cryptography Threats
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Konstantinos Limniotis, Nicholas Kolokotronis
Toward providing secure communication over an insecure channel, the TLS protocol, as a successor of the Secure Sockets Layer (SSL) protocol, is being considered as a somehow de facto standard for security in the transport layer [9]. Its most common implementation is being met in the web, since the TLS is the underlying protocol in the Hypertext Transfer Protocol Secure (HTTPS)—i.e. the secure version of the HTTP; however, the TLS can also be used for other applications, such as file transfers, instant messaging, and voice-over-IP, whereas it is also being used in IP-based IoT deployments (see, e.g. [10]).
Secure Socket Layer (SSL) Connection
Published in Hossam Fattah, LTE™ Cellular Narrowband Internet of Things (NB-IoT), 2021
Secure Sockets Layer (SSL) is widely deployed cryptographic protocol to provide security when communicating over the internet. SSL provides a secure channel between two devices or between a client and a server operating over the internet or an internal network. One common example is when SSL is used to secure communication between an NB-IoT device and a server.
Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method
Published in S. Ramakrishnan, Cryptographic and Information Security, 2018
Zahra Hossein-Nejad, Mehdi Nasri
A digital signature is a kind of asymmetric encryption. When a message is sent from an insecure channel such as the Internet, a digital signature that is valid can give the recipient the assurance that the letter is not fake and the sender has signed the letter.
MAKA: Multi-Factor Authentication and Key Agreement Scheme for LoRa-Based Smart Grid Communication Services
Published in IETE Journal of Research, 2023
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
In SG technology, a secure secret is stored/embedded in the SM. Moreover, it is important to provide data integrity and confidentiality to the messages transmitted over an insecure channel. Hence, various cryptographic techniques and authentication mechanism are introduced to preserve the security of SG communication services [2–6,9–15].