Publication Type : Conference Paper
Publisher : 2018 IEEE International Conference on Computational Intelligence and Computing Research
Source : 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (2018)
Url : https://ieeexplore.ieee.org/document/8782398
Keywords : Ciphers, Conferences, cryptographic system, Cryptography, DES, efficient key management methods, Encryption, generated key, hardware description language, Hash function, hash function method, Hash functions, key generation techniques, LFSR, Random sequences, secret key, symmetric cryptographic algorithm, telecommunication network management, VIVADO software
Campus : Amritapuri
School : School of Engineering
Center : Electronics Communication and Instrumentation Forum (ECIF)
Department : Electronics and Communication
Year : 2018
Abstract : Key management is major issue in cryptographic algorithms. Key management includes key generation and sharing of secret key between sender and the receiver. The generated key should be random in nature. The sharing of key through secure channel is also a major research area. In this paper, different key generation methods are considered for a symmetric algorithm. In the first method, lfsr based key is used. In the second method, hash function method is used for key generation. The cryptographic system with above key generation techniques is modelled using hardware description language using VIVADO software.
Cite this Research Publication : K. N. Sreehari, “Efficient key management methods for symmetric cryptographic algorithm”, in 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2018