Interpretative key management framework (IKM)
Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framewor...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.12074 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.120742018-05-30T02:49:19Z Interpretative key management framework (IKM) 2010-04 Chaeikar, Saman Shojae QA75 Electronic computers. Computer science Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framework for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each step and so need of secure key management frameworks now is felt more than ever. Proposed, Interpretative Key Management, framework reduces likelihood of attacks by eliminating key storage, reducing many times key distribution to just one time interpreter distribution, and increases security by means of using minutely, hourly, or daily key without need of key distribution. Also key revocation is automated process and IKM doesn’t require revocation call. 2010-04 Thesis http://eprints.utm.my/id/eprint/12074/ http://eprints.utm.my/id/eprint/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems Faculty of Computer Science and Information System [1] Burt Kaliski (2009): Key Management and Information Management, Proc. Of NIST Cryptographic Key Management Workshop Summary [2] Jeffrey Opper (2009): Globally Scalable Key Distribution, Proc. Of NIST Cryptographic Key Management Workshop Summary (Draft) [3] X. Yanyan. "A Scalable De-centralized Multicast Key Management Scheme," in Proc. First International Conference on Innovative Computing, Information and Control (ICICIC'06). [4] W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu." Key management and Distribution for Secure Multimedia Multicast," in Proc. IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 5, NO. 4, DECEMBER 2003. pp. 544-557. [5] R. Poovendran, and J.S. Baras. "An Information-Theoretic Approach for Design and Analysis of Rooted-Tree-Based Multicast Key Management Schemes," in Proc, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001. pp. 2824-2834. [6] M. Boujelben, H. Youssef, and M. Abid. "An efficient scheme for key predistribution in wireless sensor networks," in Proc. IEEE International Conference on Wireless & Mobile Computing, Networking & Communication. pp. 532-537. [7] Z. Liu, J. Ma, Q. Huang, and S. Moon. "Storage Requirements for Key Distribution in Sensor Networks," in Proc. The Second International Conference on Sensor Technologies and Applications. Pp. 631-638. [8] W. Fumy, and P. Landrock. "Principles of Key Management," in Proc. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 11, NO. 5, JUNE 1993. pp. 785-793. [9] F. Sato, and S. Tanaka. "A Push-Based Key Distribution and Rekeying Protocol for Secure Multicasting." [10] A.Boukerche, Y. Ren, S. Samarah. "A Secure Key Management Scheme for Wireless and Mobile Ad hoc Networks using Frequency-based Approach: Proof and Correctness," in Proc. IEEE "GLOBECOM" 2008. pp. 1-5. [11] Fred Piper, Sean Murphy, Cryptography: A Very Good Introduction. Oxford University Press. [12] Enterprise Key Management, BITS Security Working Group, May 2008, Pp17 [13] Xuanwu Zhou, Ping Wei. “Key Management Scheme Based on (t, n) Threshold Cryptosystem,” in Proc. IEEE 2008 3rd International Conference on Intelligent System and Knowledge Engineering. [14] T. Sobh et al. “Analyzing the Key Distribution from Security Attacks in Wireless Sensor,” in Proc. Springer Innovative Algorithms and Techniques in Automation 2007. pp 353-357. |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
QA75 Electronic computers Computer science |
spellingShingle |
QA75 Electronic computers Computer science Chaeikar, Saman Shojae Interpretative key management framework (IKM) |
description |
Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framework for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each step and so need of secure key management frameworks now is felt more than ever. Proposed, Interpretative Key Management, framework reduces likelihood of attacks by eliminating key storage, reducing many times key distribution to just one time interpreter distribution, and increases security by means of using minutely, hourly, or daily key without need of key distribution. Also key revocation is automated process and IKM doesn’t require revocation call. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Chaeikar, Saman Shojae |
author_facet |
Chaeikar, Saman Shojae |
author_sort |
Chaeikar, Saman Shojae |
title |
Interpretative key management framework (IKM) |
title_short |
Interpretative key management framework (IKM) |
title_full |
Interpretative key management framework (IKM) |
title_fullStr |
Interpretative key management framework (IKM) |
title_full_unstemmed |
Interpretative key management framework (IKM) |
title_sort |
interpretative key management framework (ikm) |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems |
granting_department |
Faculty of Computer Science and Information System |
publishDate |
2010 |
url |
http://eprints.utm.my/id/eprint/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf |
_version_ |
1747814894452867072 |