An Efficient SKM Framework for Data Authentication and Its Application to the Adhoc Networks

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
The Internet and various other forms of electronic communication is such an essential thing to move up with this periodic global world and indulging security is another gradient to climb defeating those black hats. One essential aspect for secure communications is that of cryptography. In previous approaches RSA and ECC algorithms plays a vital role however both algorithms are lacking of mathematical problems monotonously. In the authors' proposed approach a novel protocol called Shared Key Management (SKM) is employed. In this approach McEliece algorithm is embedded with Dispense Key designed for key generation and for the key distribution. This scheme is highly scalable with respect to memory moreover number of keys are drastically reduced.

Find By Topic