Efficient key management methods for symmetric cryptographic algorithm

被引:0
作者
Sreehari, K. N. [1 ]
机构
[1] Amrita VishwaVidyapeetham, Deptof Elect & Commun Engn, Amritapuri, India
来源
2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018) | 2018年
关键词
DES; hash function; LFSR; encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
key management is major issue in cryptographic algorithms. Key management includes key generation and sharing of secret key between sender and the receiver. The generated key should be random in nature. The sharing of key through secure channel is also a major research area. In this paper, different key generation methods are considered for a symmetric algorithm. In the first method, lfsr based key is used. In the second method, hash function method is used for key generation. The cryptographic system with above key generation techniques is modelled using hardware description language using VIVADO software
引用
收藏
页码:377 / 380
页数:4
相关论文
共 10 条
  • [1] Alani Mohammed M., 2010 7 INT MULT SYST
  • [2] Bhaktavatchalu R, 2016, PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), P141, DOI 10.1109/ICACCCT.2016.7831617
  • [3] Datta Debarshi, 2017, 2017 DEVICES INTEGRA
  • [4] Kim Hong-Sik, 2006, IEEE T COMPUTER AIDE, V25
  • [5] Kim Keonwoo, 2012 7 INT C COMP CO
  • [6] Marudhai Valarmathi, 2012 ANN IEEE IND C
  • [7] McLoone M., 2003, IEE P CIRCUITS DEVIC, V150
  • [8] Noura Mohamad, 2018 IEEE MIDDL E N
  • [9] Panda Amit Kumar, 2012 INT C COMM SYST
  • [10] Pranav M, 2015 INT C APPL THEO