47,804 research outputs found
Key distribution in PKC through Quantas
Cryptography literally means "The art & science of secret writing & sending a
message between two parties in such a way that its contents cannot be
understood by someone other than the intended recipient". and Quantum word is
related with "Light". Thus, Quantum Cryptography is a way of descripting any
information in the form of quantum particles. There are no classical
cryptographic systems which are perfectly secure. In contrast to Classical
cryptography which depends upon Mathematics, Quantum Cryptography utilizes the
concepts of Quantum Physics which provides us the security against the
cleverest marauders of the present age. In the view of increasing need of
Network and Information Security, we do require methods to overcome the
Molecular Computing technologies (A future technology) and other techniques of
the various codebrakers. Both the parts i.e. Quantum Key distribution and
Information transference from Sender to Receiver are much efficient and secure.
It is based upon BB84 protocol. It can be of great use for Govt. agencies such
as Banks, Insurance, Brokerages firms, financial institutions, e-commerce and
most important is the Defense & security of any country. It is a Cryptographic
communication system in which the original users can detect unauthorized
eavesdropper and in addition it gives a guarantee of no eavesdropping. It
proves to be the ultra secure mode of communication b/w two intended parties.Comment: 11 Pages, JGraph-Hoc Journal 201
Recommended from our members
Adaptive authentication and key agreement mechanism for future cellular systems
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network. Similarly, in third generation mobile systems [3] a challenge response protocol was chosen in such a way as to achieve maximum compatibility with the current GSM security architecture. Both authentication mechanisms use symmetric key cryptography because of the limited processing power of the mobile devices. However, recent research [6] has shown that asymmetric, or public, key cryptography can be enabled successfully in future mobile terminals. In this paper, we propose a new adaptive authentication and key agreement protocol (AAKA) for future mobile communication systems. The novelty of AAKA and its main advantage over other challenge response protocols is that can be adaptive to the mobile environment and use symmetric and/or public key cryptography for user and network authentication
Implementation vulnerabilities in general quantum cryptography
Quantum cryptography is information-theoretically secure owing to its solid
basis in quantum mechanics. However, generally, initial implementations with
practical imperfections might open loopholes, allowing an eavesdropper to
compromise the security of a quantum cryptographic system. This has been shown
to happen for quantum key distribution (QKD). Here we apply experience from
implementation security of QKD to several other quantum cryptographic
primitives. We survey quantum digital signatures, quantum secret sharing,
source-independent quantum random number generation, quantum secure direct
communication, and blind quantum computing. We propose how the eavesdropper
could in principle exploit the loopholes to violate assumptions in these
protocols, breaking their security properties. Applicable countermeasures are
also discussed. It is important to consider potential implementation security
issues early in protocol design, to shorten the path to future applications.Comment: 13 pages, 8 figure
A Survey of Lightweight Cryptosystems for Smart Home Devices
A Smart Home uses interconnected network technology to monitor the environment, control the various physical appliances, and communicate with each other in a close environment. A typical smart home is made up of a security system, intercommunication system, lighting system, and ventilation system. Data security schemes for smart homes are ineffective due to inefficiency cryptosystems, high energy consumption, and low exchange security. Traditional cryptosystems are less-applicable because of their large block size, large key size, and complex rounds. This paper conducts a review of smart homes, and adopts Ultra-Sooner Lightweight Cryptography to secure home door. It provides extensive background of cryptography, forms of cryptography as associated issues and strengths, current trends, smart home door system design, and future works suggestions. Specifically, there are prospects of utilizing XORed lightweight cryptosystem for developing encryption and decryption algorithms in smart home devices. The Substitution Permutation Network, and Feistel Network cryptographic primitives were most advanced forms of cipher operations with security guarantees. Therefore, better security, memory and energy efficiency can be obtained with lightweight ciphers in smart home devices when compared to existing solutions. In the subsequent studies, a blockchain-based lightweight cryptography can be the next springboard in attaining the most advanced security for smart home systems and their appliances.
 
A new Definition and Classification of Physical Unclonable Functions
A new definition of "Physical Unclonable Functions" (PUFs), the first one
that fully captures its intuitive idea among experts, is presented. A PUF is an
information-storage system with a security mechanism that is
1. meant to impede the duplication of a precisely described
storage-functionality in another, separate system and
2. remains effective against an attacker with temporary access to the whole
original system.
A novel classification scheme of the security objectives and mechanisms of
PUFs is proposed and its usefulness to aid future research and security
evaluation is demonstrated. One class of PUF security mechanisms that prevents
an attacker to apply all addresses at which secrets are stored in the
information-storage system, is shown to be closely analogous to cryptographic
encryption. Its development marks the dawn of a new fundamental primitive of
hardware-security engineering: cryptostorage. These results firmly establish
PUFs as a fundamental concept of hardware security.Comment: 6 pages, 3 figures; Proceedings "CS2 '15 Proceedings of the Second
Workshop on Cryptography and Security in Computing Systems", Amsterdam, 2015,
ACM Digital Librar
- …