NEW PROPOSAL FOR KEY MANAGEMENT | ||||
International Conference on Aerospace Sciences and Aviation Technology | ||||
Article 42, Volume 11, ASAT Conference, 17-19 May 2005, May 2011, Page 725-730 PDF (1.16 MB) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/asat.2011.27181 | ||||
View on SCiNiTO | ||||
Author | ||||
Alaa Fahmy | ||||
Assoc. Prof. Dept. of Electrical Engineering, Military Technical College, Cairo, Egypt. | ||||
Abstract | ||||
Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard, and keeping the keys secret is much harder. Cryptanalysts usually attack both symmetric and public key cryptosystems through their key management. We introduce a protocol to exchange cipher keys over insecure communication channel. This protocol is based on public key cryptosystem, especially elliptic curve cryptosystem. Meanwhile, it tests the cipher keys and selects only the good keys and rejects the weak one. | ||||
Keywords | ||||
Key distribution; and key management | ||||
Statistics Article View: 94 PDF Download: 172 |
||||