Security Investigate

Key Management Scheme on Block Cipher

Download now Free registration required

Executive Summary

Cryptography helps in protecting IT systems effectively. However, many do not practice it as it is complex in nature. Cryptographic algorithms could be either asymmetric or symmetric. In either case, the process of cryptography involves the distribution of keys pertaining to cryptography in order to ensure that the security assumptions can't easily made by adversaries. In case of distributed network environments, the process of distribution of cryptographic primitives across networked nodes is more useful as it can facilitate fault tolerance and security. Many nodes are involved in security mechanism and the sudden absence of any node can't cause breaking of whole security as the other nodes perform the job in the distributed environment.

  • Format: PDF
  • Size: 112.2 KB