Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright © 2017 John Wiley & Sons, Ltd.
In order to make the communication more secure in the dynamic environment, the signal strength is used through which high entropy bit can be achieved. The received signal strength is used to find the nearest node in order to forward the data towards the destination node. In the existing system the secret key is generated only by the source and the destination nodes. In our proposed system, the secret key is generated by each and every hop. The generated key is quantized by the technique called quantization and the bit mismatch is reduced by information reconciliation technique. The bits that are lost during information reconciliation is avoided by distillation. In order to reduce the resultant output bit stream, hash key of the secret key is generated by using Privacy amplification technique. The low output bit stream result in high entropy. Here the predictable key generation is highly reduced. In this we are generating the random number to ensure data integrity and authentication. For this MNF hash function is used which is of 256 bits Privacy amplification is used to ensure that the resultant bit pattern is random. The mismatched bits can also be identified easily. Multiple sensors are involved in increasing the rate of the secret key generation. Generated bit streams are verified by randomness test. Our experiment has been implemented in 802.11A laptops.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.