2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technolog 2012
DOI: 10.1109/ecticon.2012.6254320
|View full text |Cite
|
Sign up to set email alerts
|

An enhancement of the SDP Security Description (SDES) for key protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…The 10-bit key can be generated by using any random 10-bit binary string generation algorithm. Studies [10], [46] present a detailed description of cyphertext formation from a parallel 8-bit input string using SDES and the corresponding key generation. Let n instances of 8-bit strings be generated from the input text file and store them in Pt n , where n is the total number of characters.…”
Section: A Sdes Encryptionmentioning
confidence: 99%
“…The 10-bit key can be generated by using any random 10-bit binary string generation algorithm. Studies [10], [46] present a detailed description of cyphertext formation from a parallel 8-bit input string using SDES and the corresponding key generation. Let n instances of 8-bit strings be generated from the input text file and store them in Pt n , where n is the total number of characters.…”
Section: A Sdes Encryptionmentioning
confidence: 99%
“…DH key has the advantage of providing perfect forward security, whereas pre-shared key suffers from scalability problems for larger user groups and public key requires a public key infrastructure to handle the secure distribution of public keys. The Z and Real-Time Transport Protocol (ZRTP), which also defines an S key agreement protocol, relies on a DH key exchange per session to generate the S key [3], [4]. The DH key agreement methods in MIKEY and ZRTP produce a relatively high computational workload because they use a discrete logarithmic algorithm.…”
Section: Introductionmentioning
confidence: 99%