1978
DOI: 10.1147/sj.172.0106
|View full text |Cite
|
Sign up to set email alerts
|

A cryptographic key management scheme for implementing the Data Encryption Standard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

1987
1987
2015
2015

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(25 citation statements)
references
References 3 publications
0
25
0
Order By: Relevance
“…The traditional methods of key management like master/session key scheduling approaches [2], [3] are sophisticated and costly. Here, we propose a simpler technique that derives the required secrecy for frame keys from secret bits delivered by Wyner secrecy encoder over the created wiretap channel.…”
Section: B Linear Cryptanalysismentioning
confidence: 99%
See 1 more Smart Citation
“…The traditional methods of key management like master/session key scheduling approaches [2], [3] are sophisticated and costly. Here, we propose a simpler technique that derives the required secrecy for frame keys from secret bits delivered by Wyner secrecy encoder over the created wiretap channel.…”
Section: B Linear Cryptanalysismentioning
confidence: 99%
“…T RADITIONALLY, end-to-end secrecy delivery relies on symmetric or asymmetric encryption residing in the upper layer of a communication system, as well as sophisticated key management schemes [2], [3]. Without requiring a secure cipher, Wyner-type secrecy encoding provides a completely different solution to link-wise secret message delivery by random binning tailored to some presumed wiretap channel models in physical layer [4], [5].…”
Section: Introductionmentioning
confidence: 99%
“…It also enables various other use, like the one demonstrated by IBM. They came up with innovative tamper proof cryptographic hardware modules to hold the keys [13]. Software implementation is extensively used to prevent software privacy or for user management.…”
Section: E Multiple Platforms For Implementationmentioning
confidence: 99%
“…IBM developed a cryptographic system for encrypting data and communications on mainframe computers [515,1027]. It includes tamper-resistant modules to hold keys.…”
Section: Security Issuesmentioning
confidence: 99%