Protection

@inproceedings{Maire2018Protection,
  title={Protection},
  author={Som Maire},
  booktitle={Encyclopedia of Cryptography and Security},
  year={2018},
  url={https://api.semanticscholar.org/CorpusID:2873616}
}
  • Som Maire
  • Published in 3 September 2018
  • Computer Science
A scheme that can limit key recovery when the user’s smart card is lost and can do so without the administrator knowing the key is described.

New Time based User Security Scheme for Smart Cards

An improved timestamp-based user authentication scheme is proposed that is more efficient and secure than R. C. Mittal scheme and allows changing password freely for the user.

Privacy-Preserved Key Agreement with User Authentication

This paper adopts the identity-based cryptosystem and the elliptic curve cryptos system to design a privacy-preserved key agreement with user authentication that can achieve several properties: mutual authentication, deniability, and forward secrecy.

Capture Resilient ElGamal Signature Protocols

One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the

Improvement over Public Key Encryption Algorithm for Security in Network Communications

The improvement of a public key encryption algorithm is exhibited which is the development of an effort of RSA to give constitutional security by making alterations and appending few other security use of codes in present algorithm.

New Authentication Algorithm Based on Verifiable Encryption with Digital Identity

An authentication algorithm based on VE is introduced, and several cryptosystems belong to the VE class, and an example of the algorithm is shown and its performance and security are discussed.

Dynamic Keys Based Sensitive Information System

A dynamic key theory based secure sensitive information system is proposed, which integrates dynamic keys with raw data to protect sensitive information; and the system also uses the keys to secure communication and enhance access control.

Cryptographic key recovery

    Y. Al-Salqan
    Computer Science
  • 1997
This paper describes a key recovery mechanism to facilitate the recovery of encryption keys and encrypted data based on adding an extra small field-the Key Recovery Entry (KRE)-to a message or file being transmitted.

A secure channel establishment method on a hardware security module

This work proposes an enhanced secure channel establishment method on a hardware security module that has been implemented on the prototype mobile trusted module.

Secured Data Transfer & Avoidance of Forgery Attacks with Digital Certificates

A Discrete Logarithm Protocol is implemented which satisfies in achieving user authentication and secret key establishment and exchanged the data between the entities through AES (Advanced Encryption Standard) or TDEA(Triple Data Encryption Algorithm) Cryptographic algorithm.

Secure strategic mail application with hardware device

The design and development of a Secure Hardware Token (SHT), is explained in this paper, which will protect the sensitive data from most of the threats, as it generates the highly secure onetime passwords (Time based OTP) ensuring that only legitimate users are authorized to access sensitive data/applications.
...

Protecting Secret Keys with Blind Computation Service

A blind computation service which can be used as a part of an encryption and decryption procedure so that the probability of successful cryptanalysis of encrypted data is controlled by both the blind computation server and the user himself.

Key Management in an Encrypting File System

    M. Blaze
    Computer Science
  • 1994
A new algorithm, based on the DES cipher, is described, for the on-line encryption of file data in a secure and efficient manner that is suitable for use in a smartcard.

More Efficient and Secure Remote User Authentication Scheme using Smart Cards

A more efficient and secure scheme is presented in that it not only resolves such problems but also involves less computations and communications than Lee et al.'s scheme.

Key Management and Mutual Authentication for Multiple Field Records Smart Cards

In this paper a key management and mutual authentication scheme is introduced, which uses parameters unique to each smart card and authorized card reader.

A smart-card-based remote authentication scheme

This article proposes a new password authentication scheme which inherits the advantages of Wu et al.'s scheme and withstands the security weakness from which Wu etAl.'s scheme suffered.

Remote User Authentication Using VMM-based Security Manager

This paper proposes a user authentication scheme using VMM-based Security Manager, and it is designed to minimize the risk of social engineering attacks and can greatly reduce the risk from social engineering, and is easy to use for regular users.

A new remote user authentication scheme using smart cards

This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.

White Box Cryptography

This paper discusses white box cryptography, which is used to protect the key from white box attack and improves its low performance and key update problem by adopting a composite mode using White Box AES and Standard AES.

Modeling of multiple agent based cryptographic key recovery protocol

This work demonstrates how a new type of multiple agent based key recovery protocol is modeled and analyzed, characterized by key encapsulation approach, protocol generalization, secret choice of key recovery agents and fork/join of session-keys by random-keys.

Establishing the Genuinity of Remote Computer Systems

A means by which a remote computer system can be challenged to demonstrate that it is genuine and trustworthy and can be granted access to distributed resources and serve as a general-purpose host for distributed computation so long as it remains in contact with some certifying authority.
...