Distributed Key Systems: Enhancing Security...

'Cryptography Tutorials - Herong's Tutorial Examples' tutorials were cited in an 'Issues in Information Systems' paper in 2013.

The Cryptography Tutorials - Herong's Tutorial Examples tutorials were cited in an "Issues in Information Systems" paper in 2013.

Date: Aug 31, 2013
Author: Erich Rice, Paul Safonov, and Dennis Guster
   from Saint Cloud State University
Source: http://www.iacis.org/iis/2013/320_iis_2013_444-451.pdf

Cloud computing has increased the need for sound and sophisticated
security strategies. Although encryption is the primary mechanism to
provide security in data transmission, cloud computing offers both
advantages and disadvantages to enhancing the encryption process.
Encryption algorithms currently available are robust, but are well
known and require a “key” to make a session unique. Therefore, if
the key is compromised the encryption can be unlocked no matter how
robust the algorithm. In the classical model, a node in a network
contains the entire key, and if compromised, then potentially the
entire cloud’s security could be breached. Also, if the key were
destroyed then all the data it protects could be lost, because the
data couldn’t be unencrypted. Therefore, splitting the key and
storing portions on multiple nodes within a cloud would make it more
difficult to compromise or lose the key. Further, the key could be
striped (like a RAID, Redundant Array of Independent Disks) so if
distributed across multiple nodes some could fail and the key could
still be recovered. This methodology could create greater security,
while providing greater fault tolerance by allowing retrieval of the
entire key even if some nodes were compromised or destroyed.


1. Abdalla, M., Bellare, M., & Neven, G. (2008). Robust Encryption,
   Cryptology ePrint Archive, 2008/440. Retrieved from
2. Barker, E., & Roginsky, A. (2012). Recommendation for Cryptographic
   Key Generation, NIST Special Publication 800-133. Retrieved from
11. Herong, Y. (2013). Cryptography Tutorials – Herong’s Tutorial Examples.
   Retrieved from https://www.herongyang.com/Cryptography/.

Table of Contents

 About This Book

 Reference Citations in 2023

 Reference Citations in 2022

 Reference Citations in 2021

 Reference Citations in 2020

 Reference Citations in 2019

 Reference Citations in 2018

 Reference Citations in 2017

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

Reference Citations in 2013

 (Android) Getting Current Date and Time

 Deatil View with other language

 Ordering and Installing SSL

 JDK (JBoss/Tomcat) SSL Issue

 Web-palveluiden koostaminen: web- ja RESTful-palvelut

 Corso di Architetture Orientate ai Servizi

 Hardening a SAS Installation on a multi tier installation on Linux

 [scala-user] for-loops still not optimized in 2.10?

 .bin/.cue - the purpose of .cue?

 (horror movie) com.hellogood.eCalendar

 Using keytool to convert bks file to p12

 Error while using LWP::Socket to send XML Data

 jdk 1.7 keytool doesn't save

 Distributed Key System Broken Up Over Multiple Nodes

 Upgrading to a Mantis UTF8

 Cant receive MMS with wifi turned on

 Including and using the MySql.Data.dll on your web host server

 Spring Download (in Korean)

 Android Data Storage Folders

Distributed Key Systems: Enhancing Security...

 WP Spreadplugin Basket not shown

 How do you get multiple resultset from a single CallableStatement?

 Blowfish Cipher Algorithm in Java

 Harmonics Systems for Time Mining

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003