2023
DOI: 10.11591/ijece.v13i1.pp911-919
|View full text |Cite
|
Sign up to set email alerts
|

Working with cryptographic key information

Abstract: It is important to create a cryptographic system such that the encryption system does not depend on the secret storage of the algorithm that is part of it, but only on the private key that is kept secret. In practice, key management is a separate area of cryptography, which is considered a problematic area. This paper describes the main characteristics of working with cryptographic key information. In that, the formation of keys and working with cryptographic key information are stored on external media. The r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Table I details the survey, analysis, and performance evaluation in terms of speed, outputs, and compatibility with the NTRU lattice. In the implementation of the algorithm presented in [5], matrix B is taken as a trapdoor and then the algorithm generates vector s with normalized form ∥B∥ GS . The process of generating a short vector s increases the security of the algorithm.…”
Section: E Theoretical Security Assessment For the Falcon Post-quantu...mentioning
confidence: 99%
See 1 more Smart Citation
“…Table I details the survey, analysis, and performance evaluation in terms of speed, outputs, and compatibility with the NTRU lattice. In the implementation of the algorithm presented in [5], matrix B is taken as a trapdoor and then the algorithm generates vector s with normalized form ∥B∥ GS . The process of generating a short vector s increases the security of the algorithm.…”
Section: E Theoretical Security Assessment For the Falcon Post-quantu...mentioning
confidence: 99%
“…With the emergence of quantum computers, traditional cryptography is gradually losing its security elements, and becomes a threat to the security of asymmetric cryptosystems and digital signatures based on number theory in quantum computers, such as RSA, DSA, Diffie-Hellman, ElGamal, and elliptic curve variants [1][2][3][4]. Post-quantum cryptosystems must ensure their security properties even in the face of quantum computers [4][5]. The Falcon scheme is one of the post-quantum digital signature schemes nominated in the postquantum cryptography competition that can be used on NIST quantum computer systems as of 2017 [1].…”
Section: Introductionmentioning
confidence: 99%
“…However, this portion requires gigantic efforts to have the wireless transmission secured. This issue has become significant after the ever-increasing amount of data transmitted, wirelessly [1]- [3]. Since electromagnetic waves can propagate anywhere, data transmission is fundamentally fraught with danger.…”
Section: Introductionmentioning
confidence: 99%