Construct a Key-Insulated Symmetric Key by Using Cryptographic Cloud Software

Provided by: International Journal on Computer Science and Technology (IJCST)
Topic: Cloud
Format: PDF
The motivation of the present study is two-fold. From a system perspective, a cloud should facilitate secure communications between the applications that run in different Virtual Machines (VMs). Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, the authors investigate key-insulated symmetric key cryptography, which can mitigate the damage caused by repeated attacks against cryptographic software. To illustrate the feasibility of key-insulated symmetric key cryptography, they also report a proof-of-concept implementation in the Kernel-based Virtual Machine (KVM) environment.

Find By Topic