Asymmetric Key Cryptography 

Asymmetric Key Cryptography 

Source publication
Article
Full-text available
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards ab...

Context in source publication

Context 1
... are wireless network protocols developed in order to provide privacy protection of the user data by encrypting the data being sent across the network. WLANs are defined under the IEEE 802.11 standard [3]. Table 1 summarizes the three major wireless security protocols. The security of a WLAN depends on the secrecy of the entire encrypting and decrypting process. Various algorithms are presently used for encrypting and decrypting without bargaining the security of the data being sent. The design and analysis of various mathematical techniques for encryption/decryption of data that ensure secure communications is termed as cryptography. Cryptology is defined as the practice and study of techniques for secure communications in presence of adversaries (third parties), which underpin cryptography and cryptanalysis. Fig. 2. Shows the hierarchy between data security and cryptology. Cryptography is composed of two major goals: • Information privacy: For keeping information transmitted via a network private without giving any information to a third party and • Authentication: To check the integrity of the message received by the user from another party connected via the same network. Cryptography operates by a senders' transmittal of an encrypted message in a systematic manner that conceals its original meaning that is then recovered by the receiver who decrypts the transmission to get the original message. Numerous cryptosystems operate algorithms that are utilized in the method of cryptography to preserve security. These systems are outlined on a group of specific parameters, known as a key, which is used in combination of original message as an input to the encrypting algorithm. The encrypted message together with the key serves as the input for the receiver when applying the decrypting algorithm. Fig. 3. Shows the process of cryptography. Data security depends entirely on the secrecy of the key. Classically cryptography algorithms are divided into two forms depending on key distribution techniques: i. Symmetric Key Algorithms [6] ii. Asymmetric Key Algorithms [6] Cryptosystems that make use of symmetric key distribution use same key for encryption and decryption. This method is also known as secret key cryptography. Secure communication channel in key management is achieved only if the symmetric keys are pre-distributed in to every pair of interactive systems. Fig. 4. Shows the process of symmetric key cryptography. Cryptosystems that make use of asymmetric key distribution use a public key system that consists of two parts: a Private key, which is kept secret and a Public key, which is distributed over the network. The sender encrypts the message using the public key of the receiver. The receiver makes use of its private key to decrypt the message. In such a distribution the private key is never in transit and hence less vulnerable to security issues. Fig. 5. Shows the process of asymmetric key cryptography. Even though classical cryptography provide security in terms of privacy of message but this security is conditional. Some of the weaknesses that make this technique unsecure are as ...

Citations

... The related work for this research is given in section II. Section III describe the proposed algorithm along with simulation details and results analyses in section IV and V. Asymmetric key cryptography [13] II. RELATED WORK Security and privacy are two major issues that need to be examined to prevent data breaches from external malicious parties or hackers [14] [15]. ...
... The WSN environment has many security issues being unable to secure the privacy of user data. One of the most serious security issues with WSN, which is vulnerable to a variety of privacy threatening attacks, one of which is a quantum computer attack that has occurred as a result of rapid advances in the use of quantum physics to break many than traditional algorithms 5 . ...
... Miralem Mohic et al. 5 described a simulated environment of a quantum key distribution network with several nodes and links. In this approach several routing protocols, packet delivery ratio and routing packets are analyzed to find a best solution to the large amount of routing data flowing through the WSN through the QKD network. ...
Article
Full-text available
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of life, which makes it is a promising technology in the future. In the coming days, as attack technologies become more improved, security will have an important role in WSN. Currently, quantum computers pose a significant risk to current encryption technologies that work in tandem with intrusion detection systems because it is difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in WSN security. The results of analysis indicated a high level of security between the data by depending on the generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical. The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually increasing the network performance. This results in the reduction of the overall amount of energy, and the time required for performing the key exchange in the encryption and decryption processes decreased.
... This creates a hypothesis that for resisting quantum computer order, new systems which would not be based on discrete logarithms issues have to be explored. This is the only way through which data security can get a guarantee for the future internet in the zone of cyberspace [8]. ...
Article
Full-text available
Quantum cryptography concentrates on the solution of cryptography that is imperishable due to the reason of fortification of secrecy which is applied to the public key distribution of quantum. It is a very prominent technology in which 2 beings can securely communicate along with the sights belongings to quantum physics. However, on basis of classical level cryptography, the used encodes were bits for data. As quantum utilizes the photons or particles polarize ones for encoding the quantized property. This is presented in qubits as a unit. Transmissions depend directly on the inalienable mechanic's law of quantum for security. This paper includes detailed insight into the three most used and appreciated quantum cryptography applications that are providing its domain-wide service in the field of mobile cloud computing. These services are (it) DARPA Network, (ii) IPSEC implementation, and (iii) the twisted light HD implementation along with quantum elements, key distribution, and protocols.
... Encryption is the key to keep information more secure in a Wi-Fi network. However, commonly utilized known encryption techniques have big weaknesses and are susceptible by attackers via compromising confidentiality and risks [2]. WEP transfer data as 64 bit or 128 bit [3] but the actual transmission keys are 40 bits and 104 bits long where the other 24 bits is an Initialization Vector (IV) to send in the packet along with the data [4]. ...
Article
Full-text available
Due to the unreliability of wired communications and the risks of controlling the process of transmitting data besides the complications that affecting data protection and the high costs of systems infrastructure, led to use wireless communications instead of wires media, but these networks are vulnerable towards illegal attacks. The side effects of these attacks are modifying data or penetrate the security system and discover its weaknesses, which leads to great material losses. These risks and difficulties led to the reluctance of wires communications and propose intelligent techniques and robust encryption algorithms for preventing data transmitted over wireless networks to keep it safe from cyber security attacks. So, there is a persistent need for providing intelligent techniques and robust algorithms to preserve conveyed information using wireless network. This paper introduces scenario for proposing intelligent technique to increase data reliability and provides a new way to improve high level of protection besides reduces infrastructure cost. The proposed system relies on two models, where the first model based on producing a knowledge base of risk rules while the aim of the second module is a risk assessment outcomes and encryption process according to attacks type. In this system, reducing risks levels based on renewable rules whereas a novel security system established on non-periodic keys with unsystematic operations using fuzzy system. We concluded that the proposed system has the ability to protect the transmitted data, increases its reliability and reduce the potential risks. MATLAB Toolkit 2014 then Weka open source package was used in encryption and data mining for the proposed system. </iframe
... To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request The message is encrypted with the keys to function as an input for recipients while implementing decrypt algorithm [8]. It is called as cryptographic process. ...
... Turkanovic and Holbl [13] said that, although the quantum for WSN do not exist yet but it is necessary to analyse the possible challenges and problems for application use. Phatia and Sumbaly [23] suggest that, main challenges for classical cryptographic security in WSN is the key distribution that improved by applying the Quantum key distribution (QKD). Moreover, Hu et al [24] point out that, traditional internet style key management protocols based on infrastructures using trusted third parties are impractical for large scale WSNs because of the unknown network topology prior to deployment and serious node constraints such as limited power and limited transmission range. ...
Article
Full-text available
The wireless sensor network is a self-organized network and data distribution system. The article focus on the data security using the application of quantum cryptography that ensure transmission of data from source node to the sink node within the wireless sensor network. Toffoli and Peres logic gates applied for secure communication within the Wireless sensor network indicates the security improvements and the energy suitability. We present the random Einstein Podolsky Rosen paradox (EPR-pair) allocation scheme that overcomes the susceptibility caused by possible compromised nodes. The EPR-paradox pairs are pre assigned quantum bit to sensor nodes randomly. The quantum entanglement through the entangled pair used by the nodes with the quantum teleportation to form a secure network link within the Wireless network. The results indicated both Toffoli and Peres gates generated the model output mathematical expression for transmitting data from source sensor node to sink sensor node. The simulation results indicates the output results is equal to the model mathematical expression
... A security analysis, based on model-checking method, was performed and the precursory results were promising especially in terms of security properties and key management. In Priyanka and Ronak (2014) proposed the use of a quantum scheme to reach unconditional security over wireless networks. The proposed framework is harnessing the laws of quantum mechanics to make it arduous for eavesdropper to compromise any data transmission enciphered with the shared keys. ...
Article
Full-text available
The extensive deployment of wireless networks has led to a significant progress in security approaches that aim to protect confidentiality. The current method for exchanging a secret key within ‘extensible authentication protocol-transport layer security’ (EAP-TLS) protocol is based on public key infrastructure (PKI). Although this technique remains one of the most widely implemented solution to authenticate users and to ensure secure data transmission, its security is only computational. In other words, by the emergence of the quantum computer, the existing cryptosystems will become completely insecure. Improving the contemporary cryptographic schemes by integrating quantum cryptography becomes a much more attractive prospect since its technology does not rely on difficult mathematical problems such as factoring large integers or computing discrete logarithms. Thus, we propose a quantum extension of EAP-TLS that allows exchanging a cryptographic key and authenticating a remote client with unconditional security, ensured by the laws of quantum physics. PRISM tool is applied as a probabilistic model checker to verify specific security properties for the new scheme.
... When information is encrypted, it is scrambled into a code so that others cannot comprehend it. Due to the high possibility of information compromise accompanying wireless networks, various encryption methods have been developed, many of which are known to have weaknesses and are susceptible to attacks thereby compromising confidentiality [2]. ...
... When information is encrypted, it is scrambled into a code so that others cannot comprehend it. Due to the high possibility of information compromise accompanying wireless networks, various encryption methods have been developed, many of which are known to have weaknesses and are susceptible to attacks thereby compromising confidentiality [2]. ...
Article
Full-text available
This paper focuses on how to protect communications that occur in a transaction so as to guide against fraudsters. Digital Signature Algorithm (DSA) is adopted to be used with the Secure Hash Algorithm-2 (SHA-2). The security of the DSA is based on the difficult computable nature of discrete logarithm over finite fields; as such, the current key size of the DSA is small and thus makes it easy for an attacker to launch a brute force attack. In order to counter this problem, the size of the prime numbers that form the basis of the key generation process used in the DSA has being increased. In Digital Signatures, the message sent to the recipient is digitally signed, but not encrypted hence, the message’s confidentiality is not guaranteed. This work therefore incorporates encryption to a digitally signed message to ensure the message’s absolute privacy. This eliminates the possibility of eavesdropping which also improves the security of the DSA. An object oriented approach is used to model the new system. The implementation of the system is done using Java Enterprise Java Bean 3 at the front end and MySQL database server is used at the back end for persistent storage of messages, private and public keys running on JBOSS server.
... In same year, Bhatia et al. proposed the engagement of polarized photons for quantum encryption in wireless environment. With reference to key distribution, they have used IEEE 802.11 standards along with features of quantum cryptography, results show the reduction in the adversary success ratio [24]. ...
Article
Full-text available
In the emerging era of communication and data processing, security is becoming the prime concern, though since the invention of computation machines / computers, scientists are proposing / improving various mechanisms and theories to address this specific concern. Most of the methods used to secure data are categorized as cryptographic methods which are normally derived from a mathematical concept and dependent upon the hardness of the mathematical problem. In computation, mathematical problems are linked to the processing capability of the machine, therefore, as the processing capability is enhancing, various known and trusted cryptographic methodologies has been compromised. Quantum computing is one of the strong contenders which is providing processing power and logic to break the conventional cryptographic methods. This paper is focused on providing the review of existing methodologies and way forward for further exploration.