Back close

Efficient key management methods for symmetric cryptographic algorithm

Publication Type : Conference Paper

Publisher : 2018 IEEE International Conference on Computational Intelligence and Computing Research

Source : 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (2018)

Url : https://ieeexplore.ieee.org/document/8782398

Keywords : Ciphers, Conferences, cryptographic system, Cryptography, DES, efficient key management methods, Encryption, generated key, hardware description language, Hash function, hash function method, Hash functions, key generation techniques, LFSR, Random sequences, secret key, symmetric cryptographic algorithm, telecommunication network management, VIVADO software

Campus : Amritapuri

School : School of Engineering

Center : Electronics Communication and Instrumentation Forum (ECIF)

Department : Electronics and Communication

Year : 2018

Abstract : Key management is major issue in cryptographic algorithms. Key management includes key generation and sharing of secret key between sender and the receiver. The generated key should be random in nature. The sharing of key through secure channel is also a major research area. In this paper, different key generation methods are considered for a symmetric algorithm. In the first method, lfsr based key is used. In the second method, hash function method is used for key generation. The cryptographic system with above key generation techniques is modelled using hardware description language using VIVADO software.

Cite this Research Publication : K. N. Sreehari, “Efficient key management methods for symmetric cryptographic algorithm”, in 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2018

Admissions Apply Now