Notes on Reference Citations - Version 2.70, by Dr. Herong Yang
Distributed Key System Broken Up Over Multiple Nodes
'Cryptography Tutorials – Herong’s Tutorial Examples' tutorial book was cited in a Midwest Instruction and Computing Symposium (MICS 2013) paper in 2013.
The Cryptography Tutorials – Herong’s Tutorial Examples tutorial book was cited in a Midwest Instruction and Computing Symposium (MICS 2013) paper in 2013.
Subject: Can A Distributed Key System Broken Up Over Multiple Nodes Provide Greater Security Robustness While Meeting System Performance Requirements Date: May 26, 2013 Author: James Redman et al. Source: http://micsymposium.org/mics_2013_Proceedings/submissions /mics20130_submission_34.pdf Abstract The need for increased network security has never been greater, with a new high profile security breach seemingly occurring on a weekly basis. Encryption can be a valuable tool in increasing network security, however, its weakness often resides in the vulnerability of the cryptographic key. If a given node in a network contains the whole key and it is compromised, then the network’s security is breached. Also, if the key is destroyed then all the information it protects could be lost. In this paper we look at the option of breaking the key up over multiple nodes, in this case six, while only three nodes are necessary to replicate the key and unlock the lock. This hopefully creates greater security while also providing a greater level of fault tolerance by allowing retrieval of the entire key even if three of the nodes are compromised. ... References  M. Abdalla, et al., “Robust Encryption,” Cryptology ePrint Archive, Report 2008/440; http://eprint.iacr.org/2008/440.pdf.  T. Ylonen and C. Lonvick, The Secure Shell (SSH) Authentication Protocol, IETF RFC 4252, January 2006; http://tools.ietf.org/html/rfc4252.  Y. Herong. (2013). Cryptography Tutorials – Herong’s Tutorial Examples. [Online]. Available: http://www.herongyang.com/Cryptography/. ...
Table of Contents