Protection
@inproceedings{Maire2018Protection, title={Protection}, author={Som Maire}, booktitle={Encyclopedia of Cryptography and Security}, year={2018}, url={https://api.semanticscholar.org/CorpusID:2873616} }
A scheme that can limit key recovery when the user’s smart card is lost and can do so without the administrator knowing the key is described.
Topics
Smart Card (opens in a new tab)Encryption Key (opens in a new tab)Factoring (opens in a new tab)Public-key Cryptosystems (opens in a new tab)RSA Keys (opens in a new tab)Rivest-Shamir-Adleman (opens in a new tab)Private Key (opens in a new tab)Public Key Certificates (opens in a new tab)Public Key (opens in a new tab)GNU Multiple Precision (opens in a new tab)
4,857 Citations
New Time based User Security Scheme for Smart Cards
- 2014
Computer Science
An improved timestamp-based user authentication scheme is proposed that is more efficient and secure than R. C. Mittal scheme and allows changing password freely for the user.
Privacy-Preserved Key Agreement with User Authentication
- 2015
Computer Science
This paper adopts the identity-based cryptosystem and the elliptic curve cryptos system to design a privacy-preserved key agreement with user authentication that can achieve several properties: mutual authentication, deniability, and forward secrecy.
Capture Resilient ElGamal Signature Protocols
- 2006
Computer Science
One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the…
Improvement over Public Key Encryption Algorithm for Security in Network Communications
- 2013
Computer Science
The improvement of a public key encryption algorithm is exhibited which is the development of an effort of RSA to give constitutional security by making alterations and appending few other security use of codes in present algorithm.
New Authentication Algorithm Based on Verifiable Encryption with Digital Identity
- 2019
Computer Science, Engineering
An authentication algorithm based on VE is introduced, and several cryptosystems belong to the VE class, and an example of the algorithm is shown and its performance and security are discussed.
Dynamic Keys Based Sensitive Information System
- 2008
Computer Science
A dynamic key theory based secure sensitive information system is proposed, which integrates dynamic keys with raw data to protect sensitive information; and the system also uses the keys to secure communication and enhance access control.
Cryptographic key recovery
- 1997
Computer Science
This paper describes a key recovery mechanism to facilitate the recovery of encryption keys and encrypted data based on adding an extra small field-the Key Recovery Entry (KRE)-to a message or file being transmitted.
A secure channel establishment method on a hardware security module
- 2014
Computer Science
This work proposes an enhanced secure channel establishment method on a hardware security module that has been implemented on the prototype mobile trusted module.
Secured Data Transfer & Avoidance of Forgery Attacks with Digital Certificates
- 2017
Computer Science, Engineering
A Discrete Logarithm Protocol is implemented which satisfies in achieving user authentication and secret key establishment and exchanged the data between the entities through AES (Advanced Encryption Standard) or TDEA(Triple Data Encryption Algorithm) Cryptographic algorithm.
Secure strategic mail application with hardware device
- 2016
Computer Science
The design and development of a Secure Hardware Token (SHT), is explained in this paper, which will protect the sensitive data from most of the threats, as it generates the highly secure onetime passwords (Time based OTP) ensuring that only legitimate users are authorized to access sensitive data/applications.
71 References
Protecting Secret Keys with Blind Computation Service
- 2003
Computer Science
A blind computation service which can be used as a part of an encryption and decryption procedure so that the probability of successful cryptanalysis of encrypted data is controlled by both the blind computation server and the user himself.
Key Management in an Encrypting File System
- 1994
Computer Science
A new algorithm, based on the DES cipher, is described, for the on-line encryption of file data in a secure and efficient manner that is suitable for use in a smartcard.
More Efficient and Secure Remote User Authentication Scheme using Smart Cards
- 2005
Computer Science
A more efficient and secure scheme is presented in that it not only resolves such problems but also involves less computations and communications than Lee et al.'s scheme.
Key Management and Mutual Authentication for Multiple Field Records Smart Cards
- 2006
Computer Science
In this paper a key management and mutual authentication scheme is introduced, which uses parameters unique to each smart card and authorized card reader.
A smart-card-based remote authentication scheme
- 2005
Computer Science
This article proposes a new password authentication scheme which inherits the advantages of Wu et al.'s scheme and withstands the security weakness from which Wu etAl.'s scheme suffered.
Remote User Authentication Using VMM-based Security Manager
- 2007
Computer Science
This paper proposes a user authentication scheme using VMM-based Security Manager, and it is designed to minimize the risk of social engineering attacks and can greatly reduce the risk from social engineering, and is easy to use for regular users.
A new remote user authentication scheme using smart cards
- 2000
Computer Science
This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
White Box Cryptography
Computer Science
This paper discusses white box cryptography, which is used to protect the key from white box attack and improves its low performance and key update problem by adopting a composite mode using White Box AES and Standard AES.
Modeling of multiple agent based cryptographic key recovery protocol
- 2003
Computer Science
This work demonstrates how a new type of multiple agent based key recovery protocol is modeled and analyzed, characterized by key encapsulation approach, protocol generalization, secret choice of key recovery agents and fork/join of session-keys by random-keys.
Establishing the Genuinity of Remote Computer Systems
- 2003
Computer Science
A means by which a remote computer system can be challenged to demonstrate that it is genuine and trustworthy and can be granted access to distributed resources and serve as a general-purpose host for distributed computation so long as it remains in contact with some certifying authority.