Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/250564
Title: | Security Using Identity Based Cryptography |
Researcher: | Ramanuj, P.N. |
Guide(s): | Shah, Jagdishchandra |
Keywords: | ECC ECDLP Engineering and Technology,Computer Science,Computer Science Software Engineering Fingerprint Identity based Security Key generation Key management Key Revocation Minutia Extraction Public Key Cryptography |
University: | RK University |
Completed Date: | 2018 |
Abstract: | Materials and Methods: Proposed scheme employs novel and innovative key generation scheme. Two levels of security have been provided in the presented scheme using both RSA algorithm and Elliptic curve Cryptography. Node s master private and public keys are generated using RSA algorithm. The fingerprint of the user has been deployed as identity and hence used for an identification key generation. An elliptic curve is defined using both node s master private key and identification key. newlineAn efficient key revocation scheme, reducing the computational load on the overall network is presented. Instead of sending entire revocation list only modifications are transmitted by sending modified revocation matrix in observation message. This increases efficiency and performance of the system. newlineTo implement the proposed scheme and to measure enhancement, JAVA and MATLAB are used as simulators. Different network scenarios are simulated and results are collected and compared. newlineResults and Discussion: Results clearly portray the efficient key generation scheme. Time analysis for different cryptographic operations is carried out. Secured key is generated as per proposed scheme in reasonable time of 290 to 320 milliseconds. Various cryptographic operations are also accomplished within a reasonable time. Key revocation is implemented using JAVA. Proposed revocation scheme enhances the performance by the reduced time needed for processing revocation list. This reduction improves the performance of existing scheme up to 80% when compared to existing revocation scheme. Proposed scheme transmits only changes in observation matrix and not the entire matrix. newlineConclusion: A novel key generation scheme is presented and desired highly secure and robust key management solution provided which is proven theoretically as well as practically. Enhancement in existing key revocation scheme proposed which results in better performance in terms of computational power, memory requirement, and other constrained network resources. newline newline |
Pagination: | 170p. |
URI: | http://hdl.handle.net/10603/250564 |
Appears in Departments: | Faculty of Technology |
Files in This Item:
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: