oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Improvement and realization of cryptography service library Cryptlib
Cryptlib密码服务库改进与实现

LI Lin,YANG Xian-wen,
李 林
,杨先文

计算机应用研究 , 2012,
Abstract: This paper introduced one cryptography service library, presented one disadvantage existed, the absence of elliptic curve encryption algorithm component, presented the corresponding improvement, embedded elliptic curve integrated encryption scheme into the library of core cryptography algorithm components. It designed the instruction of ECIES, which was proved to be right, implemented the function call of ECIES component. All of this improve the completeness of cryptography service competence provided by the library.
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
Mohamed Abid,Songbo Song,Hassnaa Moustafa,Hossam Afifi
International Journal of Network Security & Its Applications , 2009,
Abstract: Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. The standard deploys AKA-MD5 for the terminal authentication. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) toauthenticate the subscriber before accessing multimedia services over HTTP. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). This new scheme willlead to better performances when there are simultaneous authentication requests using Identity-based Batch Verification. We analyzed the security of our new protocol and we presented a performance evaluation of its cryptographic operations.
Integrating identity-based cryptography in IMS service authentication  [PDF]
Mohamed Abid,Songbo Song,Hassnaa Moustafa,Hossam Afifi
Computer Science , 2010,
Abstract: Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. The standard deploys AKA-MD5 for the terminal authentication. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) to authenticate the subscriber before accessing multimedia services over HTTP. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). This new scheme will lead to better performances when there are simultaneous authentication requests using Identity-based Batch Verification. We analyzed the security of our new protocol and we presented a performance evaluation of its cryptographic operations
A WEB SERVICE FOR SIGNING AND AUTHENTICATING DIGITAL DOCUMENTS BASED ON SYMMETRIC CRYPTOGRAPHY PROTOCOL  [PDF]
Juan Carlos Lopez Pimentel,Victor Fernando Ramos Fon Bon,Raul Monroy
International Journal of Digital Information and Wireless Communications , 2011,
Abstract: Nowadays, recognizing whether or not a digital document has been counterfeit is a priority issue, particularly in organizations where legal information is handled digitally. Signing a digital document is maybe a preliminary solution. In general, we are interested in developing a web service that allows signing a document using cryptography and steganography techniques to protect the information; and also, it can verify the authenticity of the document that has previously been signed. To protect the web service against malicious activity there are aspects of computer security that must be considered, such as the implementation of a security protocol considered secure. This article reports the general ingredients to implement a Web Service to sign and authenticate digital documents using a symmetric cryptography protocol previously published by the authors; and also it describes some implementations carried out so far.
CRYPTOGRAPHY  [cached]
Dr. Vinod Kumar,Er.Gagandeep Raheja,Ms Subeena Sareen
International Journal of Computers & Technology , 2013,
Abstract: To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies. There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.
Quantum Cryptography  [PDF]
Miloslav Dusek,Norbert Lutkenhaus,Martin Hendrych
Physics , 2006, DOI: 10.1016/S0079-6638(06)49005-3
Abstract: Elementary review article on quantum cryptography.
New field of cryptography: DNA cryptography
Guozhen Xiao,Mingxin Lu,Lei Qin,Xuejia Lai
Chinese Science Bulletin , 2006, DOI: 10.1007/s11434-006-2012-5
Abstract: DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary information density inherent in DNA molecules are explored for cryptographic purposes such as encryption, authentication, signature, and so on. In this paper, we briefly introduce the biological background of DNA cryptography and the principle of DNA computing, summarize the progress of DNA cryptographic research and several key problems, discuss the trend of DNA cryptography, and compare the status, security and application fields of DNA cryptography with those of traditional cryptography and quantum cryptography. It is pointed out that all the three kinds of cryptography have their own advantages and disadvantages and complement each other in future practical application. The current main difficulties of DNA cryptography are the absence of effective secure theory and simple realizable method. The main goal of the research of DNA cryptography is exploring characteristics of DNA molecule and reaction, establishing corresponding theories, discovering possible development directions, searching for simple methods of realizing DNA cryptography, and laying the basis for future development.
Quantum Cryptography  [PDF]
Richard J. Hughes,D. M. Alde,P. Dyer,G. G. Luther,G. L. Morgan,M. Schauer
Physics , 1995, DOI: 10.1080/00107519508222149
Abstract: Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature. In this paper we shall describe the theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an optical fiber communications link.
Cryptography, Quantum Computation and Trapped Ions  [PDF]
Richard J. Hughes
Physics , 1997, DOI: 10.1002/(SICI)1521-3978(199811)46:6/8<759::AID-PROP759>3.0.CO;2-E
Abstract: The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion trap quantum computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analyzed and an assessment of the computational potential of the technology is made.
Quantum Cryptography  [PDF]
Nicolas Gisin,Grégoire Ribordy,Wolfgang Tittel,Hugo Zbinden
Physics , 2001, DOI: 10.1103/RevModPhys.74.145
Abstract: Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.