2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2017
DOI: 10.1109/itnec.2017.8285102
|View full text |Cite
|
Sign up to set email alerts
|

Research on a hybrid system with perfect forward secrecy

Abstract: The rapid development of computer technology will be the whole world as a whole, the widespread application of instant messaging technology to bring great convenience to people's lives, while privacy protection has become a more significant problem. For ordinary it's hard to equip themselves with a cryptograph machine. In this paper, through in-depth study of elliptic curve cryptosystem ECC and advanced encryption standard AES encryption algorithm, according to the characteristics of public key cryptography, e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. You, Shi, Chen, Qi and Qing (2017) implemented DH key exchange on the matrix platform, and an improved key negotiation algorithm was proposed to obtain the negotiation key before exchanging the intermediate value. The necessary and sufficient conditions for the fourth order reversible matrix on the finite field GF(28) were obtained by studying the reversible matrix.…”
Section: Hybrid Security Approach In Data Transmission Related-iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Messages encrypted with the public key can only be decrypted in a reasonable amount of time using the private key. You, Shi, Chen, Qi and Qing (2017) implemented DH key exchange on the matrix platform, and an improved key negotiation algorithm was proposed to obtain the negotiation key before exchanging the intermediate value. The necessary and sufficient conditions for the fourth order reversible matrix on the finite field GF(28) were obtained by studying the reversible matrix.…”
Section: Hybrid Security Approach In Data Transmission Related-iotmentioning
confidence: 99%
“…Table 7 summarizes the related work in information security. Based on the table, it is found that some studies by Yousefi and Jameii (2017), Mathur and Bansode (2016), Ravikant and Lilhore (2016) and You et al (2017) have implemented the AES scheme to protect data confidentiality in IoT information security. Journal of ICT,19,No.…”
Section: Hybrid Security Approach In Information Securitymentioning
confidence: 99%