Interpretative key management framework (IKM)

Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framewor...

Full description

Saved in:
Bibliographic Details
Main Author: Chaeikar, Saman Shojae
Format: Thesis
Language:English
Published: 2010
Subjects:
Online Access:http://eprints.utm.my/id/eprint/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.12074
record_format uketd_dc
spelling my-utm-ep.120742018-05-30T02:49:19Z Interpretative key management framework (IKM) 2010-04 Chaeikar, Saman Shojae QA75 Electronic computers. Computer science Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framework for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each step and so need of secure key management frameworks now is felt more than ever. Proposed, Interpretative Key Management, framework reduces likelihood of attacks by eliminating key storage, reducing many times key distribution to just one time interpreter distribution, and increases security by means of using minutely, hourly, or daily key without need of key distribution. Also key revocation is automated process and IKM doesn’t require revocation call. 2010-04 Thesis http://eprints.utm.my/id/eprint/12074/ http://eprints.utm.my/id/eprint/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf application/pdf en public masters Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems Faculty of Computer Science and Information System [1] Burt Kaliski (2009): Key Management and Information Management, Proc. Of NIST Cryptographic Key Management Workshop Summary [2] Jeffrey Opper (2009): Globally Scalable Key Distribution, Proc. Of NIST Cryptographic Key Management Workshop Summary (Draft) [3] X. Yanyan. "A Scalable De-centralized Multicast Key Management Scheme," in Proc. First International Conference on Innovative Computing, Information and Control (ICICIC'06). [4] W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu." Key management and Distribution for Secure Multimedia Multicast," in Proc. IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 5, NO. 4, DECEMBER 2003. pp. 544-557. [5] R. Poovendran, and J.S. Baras. "An Information-Theoretic Approach for Design and Analysis of Rooted-Tree-Based Multicast Key Management Schemes," in Proc, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001. pp. 2824-2834. [6] M. Boujelben, H. Youssef, and M. Abid. "An efficient scheme for key predistribution in wireless sensor networks," in Proc. IEEE International Conference on Wireless & Mobile Computing, Networking & Communication. pp. 532-537. [7] Z. Liu, J. Ma, Q. Huang, and S. Moon. "Storage Requirements for Key Distribution in Sensor Networks," in Proc. The Second International Conference on Sensor Technologies and Applications. Pp. 631-638. [8] W. Fumy, and P. Landrock. "Principles of Key Management," in Proc. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 11, NO. 5, JUNE 1993. pp. 785-793. [9] F. Sato, and S. Tanaka. "A Push-Based Key Distribution and Rekeying Protocol for Secure Multicasting." [10] A.Boukerche, Y. Ren, S. Samarah. "A Secure Key Management Scheme for Wireless and Mobile Ad hoc Networks using Frequency-based Approach: Proof and Correctness," in Proc. IEEE "GLOBECOM" 2008. pp. 1-5. [11] Fred Piper, Sean Murphy, Cryptography: A Very Good Introduction. Oxford University Press. [12] Enterprise Key Management, BITS Security Working Group, May 2008, Pp17 [13] Xuanwu Zhou, Ping Wei. “Key Management Scheme Based on (t, n) Threshold Cryptosystem,” in Proc. IEEE 2008 3rd International Conference on Intelligent System and Knowledge Engineering. [14] T. Sobh et al. “Analyzing the Key Distribution from Security Attacks in Wireless Sensor,” in Proc. Springer Innovative Algorithms and Techniques in Automation 2007. pp 353-357.
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Chaeikar, Saman Shojae
Interpretative key management framework (IKM)
description Cryptography has been employed to establishing secure communication over insecure networks. Using symmetric keys to encipher and decipher data is one of common practices for achieving secrecy over networks. To employ symmetric key cryptography we require a secure and reliable key management framework for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each step and so need of secure key management frameworks now is felt more than ever. Proposed, Interpretative Key Management, framework reduces likelihood of attacks by eliminating key storage, reducing many times key distribution to just one time interpreter distribution, and increases security by means of using minutely, hourly, or daily key without need of key distribution. Also key revocation is automated process and IKM doesn’t require revocation call.
format Thesis
qualification_level Master's degree
author Chaeikar, Saman Shojae
author_facet Chaeikar, Saman Shojae
author_sort Chaeikar, Saman Shojae
title Interpretative key management framework (IKM)
title_short Interpretative key management framework (IKM)
title_full Interpretative key management framework (IKM)
title_fullStr Interpretative key management framework (IKM)
title_full_unstemmed Interpretative key management framework (IKM)
title_sort interpretative key management framework (ikm)
granting_institution Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems
granting_department Faculty of Computer Science and Information System
publishDate 2010
url http://eprints.utm.my/id/eprint/12074/1/SamanShojaeChaeikarMFSKSM2010.pdf
_version_ 1747814894452867072