We present a distributed algorithm for validating the association between the network identifier of a host and its public key without relying on a priori shared secrets or a trusted certification authority.关键词: ad hoc networks protocols public key cryptography telecommunication network routing ...
The AES code superseded the Data Encryption Standard (DES) algorithm [50] a few years ago. Mathematically and computationally, it is much simpler than RSA, but its level of protection is also reduced. Even so, with a 256-bit key, the US Government supports its use for Top-Secret files....
Sunar, "Public key cryptography in sensor networks-revisited," in Proceedings of the 1st Euro- pean Workshop on Security in Ad-Hoc and Sensor Networks, pp. 2-18, Heidelberg, Germany, August 2005.Gaubatz, G., Kaps, J.-P., and Sunar, B., "Public Key Cryptography in Sensor Networks-...
This paper proposes an algorithm for Public Key Cryptography (PKC) using the hybrid concept of two evolutionary algorithms, Particle Swarm Optimization (PS... S Mishra,S Bali - 《International Journal of Advanced Research in Computer Science & Software Engineering》 被引量: 3发表: 2013年 On Mult...
Public key. Public key cryptography (PKC) is based on the algorithm of asymmetrical cryptography, which is not recommended for the wireless sensor networks, since the energy and processing power of sensor nodes is limited. Nevertheless, considering the recent developments in sensor hardware and method...
This paper presents a secure autoconfiguration and public-key distribution algorithm to achieve uniqueness of address allocation and secure public-key distribution when a new node joins a MANET, which provides the bootstrapping for building a distributed certificate authority (DCA) in the network ...
The second component of a cryptographic key pair used in public key infrastructure is the private, or secret, key. This key is kept private by the recipient of the encrypted message and used to decrypt the transmission. Complex algorithms are used to encrypt and decrypt public/private key pairs...
Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS...A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through ...
In most cases, two related functions are employed, one for encryption and the other for decryption. With most modern cryptography, the ability to keep encrypted information secret is based not on the cryptographic algorithm, which is widely known, but on a number called a key that must be ...
Research on NTRU Algorithm for Mobile Java Security NTRU, a relatively new public key cryptosystem based on the shortest vector problem in a lattice, with many advantages compared with other cryptosystems, ... X Shen,Z Du,C Rong - International Conference on Scalable Computing & Communications; ...