fbpx
Wikipedia

Key distribution

In symmetric key cryptography, both parties must possess a secret key which they must exchange prior to using any encryption. Distribution of secret keys has been problematic until recently, because it involved face-to-face meeting, use of a trusted courier, or sending the key through an existing encryption channel. The first two are often impractical and always unsafe, while the third depends on the security of a previous key exchange.

In public key cryptography, the key distribution of public keys is done through public key servers. When a person creates a key-pair, they keep one key private and the other, known as the public-key, is uploaded to a server where it can be accessed by anyone to send the user a private, encrypted, message.

Secure Sockets Layer (SSL) uses Diffie–Hellman key exchange if the client does not have a public-private key pair and a published certificate in the public key infrastructure, and Public Key Cryptography if the user does have both the keys and the credential.

Key distribution is an important issue in wireless sensor network (WSN) design. There are many key distribution schemes in the literature that are designed to maintain an easy and at the same time secure communication among sensor nodes. The most accepted method of key distribution in WSNs is key predistribution, where secret keys are placed in sensor nodes before deployment. When the nodes are deployed over the target area, the secret keys are used to create the network.[1]

For more info see: key distribution in wireless sensor networks.

Storage of keys in the cloud edit

Key distribution and key storage are more problematic in the cloud due to the transitory nature of the agents on it.[2] Secret sharing can be used to store keys at many different servers on the cloud.[3] In secret sharing, a secret is used as a seed to generate a number of distinct secrets, and the pieces are distributed so that some subset of the recipients can jointly authenticate themselves and use the secret information without learning what it is. But rather than store files on different servers, the key is parceled out and its secret shares stored at multiple locations in a manner that a subset of the shares can regenerate the key.

Secret sharing is used in cases where one wishes to distribute a secret among N shares so that M < N of them (M of N) can regenerate the original secret, but no smaller group up to M − 1 can do so.[4][5]

Notes edit

  1. ^ Du, Wenliang; Deng, Jing; Han, Yunghsiang; Varshney, Pramod (2000). "A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks". Electrical Engineering and Computer Science - Paper 36.
  2. ^ Yu, S. et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. IEEE INFOCOM 2010.
  3. ^ Parakh, A. and Kak, S. Online data storage using implicit security. Information Sciences, vol. 179, pp. 3323-3331, 2009.
  4. ^ Shamir, Adi (1979). "How to share a secret". Communications of the ACM 22 (11): 612–613.
  5. ^ Blakley, G. R. (1979). "Safeguarding cryptographic keys". Proceedings of the National Computer Conference 48: 313–317.

distribution, symmetric, cryptography, both, parties, must, possess, secret, which, they, must, exchange, prior, using, encryption, distribution, secret, keys, been, problematic, until, recently, because, involved, face, face, meeting, trusted, courier, sendin. In symmetric key cryptography both parties must possess a secret key which they must exchange prior to using any encryption Distribution of secret keys has been problematic until recently because it involved face to face meeting use of a trusted courier or sending the key through an existing encryption channel The first two are often impractical and always unsafe while the third depends on the security of a previous key exchange In public key cryptography the key distribution of public keys is done through public key servers When a person creates a key pair they keep one key private and the other known as the public key is uploaded to a server where it can be accessed by anyone to send the user a private encrypted message Secure Sockets Layer SSL uses Diffie Hellman key exchange if the client does not have a public private key pair and a published certificate in the public key infrastructure and Public Key Cryptography if the user does have both the keys and the credential Key distribution is an important issue in wireless sensor network WSN design There are many key distribution schemes in the literature that are designed to maintain an easy and at the same time secure communication among sensor nodes The most accepted method of key distribution in WSNs is key predistribution where secret keys are placed in sensor nodes before deployment When the nodes are deployed over the target area the secret keys are used to create the network 1 For more info see key distribution in wireless sensor networks Storage of keys in the cloud editKey distribution and key storage are more problematic in the cloud due to the transitory nature of the agents on it 2 Secret sharing can be used to store keys at many different servers on the cloud 3 In secret sharing a secret is used as a seed to generate a number of distinct secrets and the pieces are distributed so that some subset of the recipients can jointly authenticate themselves and use the secret information without learning what it is But rather than store files on different servers the key is parceled out and its secret shares stored at multiple locations in a manner that a subset of the shares can regenerate the key Secret sharing is used in cases where one wishes to distribute a secret among N shares so that M lt N of them M of N can regenerate the original secret but no smaller group up to M 1 can do so 4 5 Notes edit Du Wenliang Deng Jing Han Yunghsiang Varshney Pramod 2000 A Pairwise Key Pre Distribution Scheme for Wireless Sensor Networks Electrical Engineering and Computer Science Paper 36 Yu S et al Achieving Secure Scalable and Fine grained Data Access Control in Cloud Computing IEEE INFOCOM 2010 Parakh A and Kak S Online data storage using implicit security Information Sciences vol 179 pp 3323 3331 2009 Shamir Adi 1979 How to share a secret Communications of the ACM 22 11 612 613 Blakley G R 1979 Safeguarding cryptographic keys Proceedings of the National Computer Conference 48 313 317 Retrieved from https en wikipedia org w index php title Key distribution amp oldid 1204279143, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.