Public key exchange scheme that is addressable (PKA).

IEEE Conference on Communications and Network Security(2017)

引用 5|浏览9
暂无评分
摘要
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent communications between the parties can therefore occurs over untrusted channels, by exchanging dynamically generated public keys. Private keys are, generated independently with all communicating parties using their cryptographic tables, and the shared public keys. The private keys are combined with methods such as the Advanced Encryption Standard (AES) to encrypt and decrypt the communication between users. The generation of private keys is done without mathematical computations that are potentially vulnerable to quantum computers using algorithms such as the one developed by Shor [2]. PKA is fast and requires approximately 800 CPU clock cycles. We implemented, and tested the PKA dynamic key exchange scheme in legacy systems to secure PC-to-PC communication, and PC to smart card communication with AES.
更多
查看译文
关键词
private keys,communicating parties,shared public keys,Advanced Encryption Standard,PKA dynamic key exchange scheme,PC-to-PC communication,smart card communication,Public key exchange scheme,PKA encryption scheme,secure exchange,addressable cryptographic tables,addressable Physical Unclonable Function,Public Key Infrastructures
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要