Distributed Key System Broken Up Over Multiple Nodes

'Cryptography Tutorials – Herong’s Tutorial Examples' tutorial book was cited in a Midwest Instruction and Computing Symposium (MICS 2013) paper in 2013.

The Cryptography Tutorials – Herong’s Tutorial Examples tutorial book was cited in a Midwest Instruction and Computing Symposium (MICS 2013) paper in 2013.

Subject: Can A Distributed Key System Broken Up Over Multiple Nodes
   Provide Greater Security Robustness While Meeting System
   Performance Requirements
Date: May 26, 2013
Author: James Redman et al.
Source: http://micsymposium.org/mics_2013_Proceedings/submissions


The need for increased network security has never been greater, with a
new high profile security breach seemingly occurring on a weekly
basis. Encryption can be a valuable tool in increasing network
security, however, its weakness often resides in the vulnerability of
the cryptographic key. If a given node in a network contains the whole
key and it is compromised, then the network’s security is breached.
Also, if the key is destroyed then all the information it protects
could be lost. In this paper we look at the option of breaking the key
up over multiple nodes, in this case six, while only three nodes are
necessary to replicate the key and unlock the lock. This hopefully
creates greater security while also providing a greater level of fault
tolerance by allowing retrieval of the entire key even if three of the
nodes are compromised.



[1] M. Abdalla, et al., “Robust Encryption,” Cryptology ePrint
   Archive, Report 2008/440; http://eprint.iacr.org/2008/440.pdf.
[2] T. Ylonen and C. Lonvick, The Secure Shell (SSH) Authentication
   Protocol, IETF RFC 4252, January 2006;
[3] Y. Herong. (2013). Cryptography Tutorials –
   Herong’s Tutorial Examples. [Online].
   Available: http://www.herongyang.com/Cryptography/.

Table of Contents

 About This Book

 Reference Citations in 2020

 Reference Citations in 2019

 Reference Citations in 2018

 Reference Citations in 2017

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

Reference Citations in 2013

 (Android) Getting Current Date and Time

 Deatil View with other language

 Ordering and Installing SSL

 JDK (JBoss/Tomcat) SSL Issue

 Web-palveluiden koostaminen: web- ja RESTful-palvelut

 Corso di Architetture Orientate ai Servizi

 Hardening a SAS Installation on a multi tier installation on Linux

 [scala-user] for-loops still not optimized in 2.10?

 .bin/.cue - the purpose of .cue?

 (horror movie) com.hellogood.eCalendar

 Using keytool to convert bks file to p12

 Error while using LWP::Socket to send XML Data

 jdk 1.7 keytool doesn't save

Distributed Key System Broken Up Over Multiple Nodes

 Upgrading to a Mantis UTF8

 Cant receive MMS with wifi turned on

 Including and using the MySql.Data.dll on your web host server

 Spring Download (in Korean)

 Android Data Storage Folders

 Distributed Key Systems: Enhancing Security...

 WP Spreadplugin Basket not shown

 How do you get multiple resultset from a single CallableStatement?

 Blowfish Cipher Algorithm in Java

 Harmonics Systems for Time Mining

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003