scholarly journals Backup key generation model for one-time password security protocol

Author(s):  
N Jeyanthi ◽  
Sourav Kundu

The overhead for resource utilization in the round coding operation of security coding is large. Though lightweight protocols are used as a measure of provisioning, higher level of security in many real time applications, the need of key scheduling, key generation and s-box operation leads to large resource utilization. This resource consumption intern leads to large power consumption and area overhead. To minimize the resource utilization in this paper, a new resource optimization technique following resource reutilization scheme is proposed. The resource utilization is synchronized by the delay term instruction application in cryptography coding.


Author(s):  
John Mark Espalmado ◽  
Edwin Arboleda

Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.


2009 ◽  
Vol 129 (9) ◽  
pp. 1690-1698
Author(s):  
Manabu Gouko ◽  
Naoki Tomi ◽  
Tomoaki Nagano ◽  
Koji Ito
Keyword(s):  

2012 ◽  
Vol E95.B (7) ◽  
pp. 2245-2256 ◽  
Author(s):  
Jung-Yoon KIM ◽  
Hyoung-Kee CHOI
Keyword(s):  

Author(s):  
Yasuhiko IKEMATSU ◽  
Dung Hoang DUONG ◽  
Albrecht PETZOLDT ◽  
Tsuyoshi TAKAGI

Sign in / Sign up

Export Citation Format

Share Document