Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/250564
Title: Security Using Identity Based Cryptography
Researcher: Ramanuj, P.N.
Guide(s): Shah, Jagdishchandra
Keywords: ECC
ECDLP
Engineering and Technology,Computer Science,Computer Science Software Engineering
Fingerprint
Identity based Security
Key generation
Key management
Key Revocation
Minutia Extraction
Public Key Cryptography
University: RK University
Completed Date: 2018
Abstract: Materials and Methods: Proposed scheme employs novel and innovative key generation scheme. Two levels of security have been provided in the presented scheme using both RSA algorithm and Elliptic curve Cryptography. Node s master private and public keys are generated using RSA algorithm. The fingerprint of the user has been deployed as identity and hence used for an identification key generation. An elliptic curve is defined using both node s master private key and identification key. newlineAn efficient key revocation scheme, reducing the computational load on the overall network is presented. Instead of sending entire revocation list only modifications are transmitted by sending modified revocation matrix in observation message. This increases efficiency and performance of the system. newlineTo implement the proposed scheme and to measure enhancement, JAVA and MATLAB are used as simulators. Different network scenarios are simulated and results are collected and compared. newlineResults and Discussion: Results clearly portray the efficient key generation scheme. Time analysis for different cryptographic operations is carried out. Secured key is generated as per proposed scheme in reasonable time of 290 to 320 milliseconds. Various cryptographic operations are also accomplished within a reasonable time. Key revocation is implemented using JAVA. Proposed revocation scheme enhances the performance by the reduced time needed for processing revocation list. This reduction improves the performance of existing scheme up to 80% when compared to existing revocation scheme. Proposed scheme transmits only changes in observation matrix and not the entire matrix. newlineConclusion: A novel key generation scheme is presented and desired highly secure and robust key management solution provided which is proven theoretically as well as practically. Enhancement in existing key revocation scheme proposed which results in better performance in terms of computational power, memory requirement, and other constrained network resources. newline newline
Pagination: 170p.
URI: http://hdl.handle.net/10603/250564
Appears in Departments:Faculty of Technology

Files in This Item:
File Description SizeFormat 
01_cover page.pdfAttached File84.11 kBAdobe PDFView/Open
02_certificate.pdf86.81 kBAdobe PDFView/Open
03_declaration.pdf138.14 kBAdobe PDFView/Open
04_acknowledgement.pdf106.89 kBAdobe PDFView/Open
05_table of contents.pdf173.03 kBAdobe PDFView/Open
06_list of tables.pdf169.58 kBAdobe PDFView/Open
07_list of figures.pdf147.39 kBAdobe PDFView/Open
08_ list of abbreviations.pdf126.44 kBAdobe PDFView/Open
09_abstract.pdf143.46 kBAdobe PDFView/Open
10_graphical abstract.pdf106.4 kBAdobe PDFView/Open
11_chapter 1.pdf168.06 kBAdobe PDFView/Open
12_chapter 2.pdf542.21 kBAdobe PDFView/Open
13_chapter 3.pdf353.7 kBAdobe PDFView/Open
14_chapter 4.pdf589.2 kBAdobe PDFView/Open
15_chapter 5.pdf365.69 kBAdobe PDFView/Open
16_chapter 6.pdf335.57 kBAdobe PDFView/Open
17_chapter 7.pdf231.51 kBAdobe PDFView/Open
18_chapter 8.pdf790.41 kBAdobe PDFView/Open
19_chapter 9.pdf144.67 kBAdobe PDFView/Open
20_list of publication.pdf84.21 kBAdobe PDFView/Open
21_references.pdf191.96 kBAdobe PDFView/Open
22_appendix.pdf146.85 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: