839 research outputs found

    Basic key exchange protocols for secret key cryptosystems under CRYMPIX library

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2007Includes bibliographical references (leaves: 47-48)Text in English; Abstract: Turkish and Englishviii, 50 leavesKey exchange protocols are developed in order to overcome the key distribution problem of symmetrical cryptosystems. These protocols which are based on various algebraic domains are different implementations of public-key cryptography. In this thesis, the basic key exchange protocols are reviewed and CRYMPIX implementations of them are provided. CRYMPIX has a portable structure that provides platform independence for generated code. Hence, the implemented key exchange mechanisms are suitable to be used on different hardware and software platforms

    RSA authentication mechanisms in control grid computing environment using Gridsim toolkit

    Get PDF
    There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most critical factor pertaining to this.There are several approaches has been discussed in the grid computing environment on the safeguard, scalable and efficient authentication that are either Virtual Organization centric or Resource centric.Most of the grid computing uses public key infrastructure (PKI) to secure the identification, but the vulnerability are still cannot be avoid. In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator

    Three-way security framework for cloud based IoT network

    Get PDF

    Novel Techniques for Secure Use of Public Cloud Computing Resources

    Get PDF
    The federal government has an expressed interest in moving data and services to third party service providers in order to take advantage of the flexibility, scalability, and potential cost savings. This approach is called cloud computing. The thesis for this research is that efficient techniques exist to support the secure use of public cloud computing resources by a large, federated enterprise. The primary contributions of this research are the novel cryptographic system MA-AHASBE (Multi-Authority Anonymous Hierarchical Attribute-Set Based Encryption), and the techniques used to incorporate MA-AHASBE in a real world application. Performance results indicate that while there is a cost associated with enforcing the suggested security model, the cost is not unreasonable and the benefits in security can be significant. The contributions of this research give the DoD additional tools for supporting the mission while taking advantage of the cost efficient public cloud computing resources that are becoming widely available
    corecore