DocumentCode :
2046792
Title :
Proactive security: Key refreshing algorithm for long term protection
Author :
Retoliya, Rajkumari ; Tripathi, Anshu ; Prajapati, Sapan ; Mehta, Rupali
Author_Institution :
Dept. of Info. Tech., Mahakal Inst. of Tech., Ujjain, India
Volume :
6
fYear :
2011
fDate :
8-10 April 2011
Firstpage :
227
Lastpage :
231
Abstract :
This Paper provides Proactive share key refreshing technique for maintaining the security of the system, even when some nodes are in control of attacker. It provides an automated recovery of the security of individual components, avoiding the use of expensive and inconvenient manual processes. The technique can be used with threshold cryptography, by providing periodic refreshments of the sensitive data held by the servers. This way the proactive approach guarantees uninterrupted security as long as not too many servers are broken at the same time. In this paper a solution is provided to enhance security among communication channel. For this a proactive share refreshing technique is represented in the form of algorithm in which some trusted nodes share the private key, which is a part of private-public key pair. Here the private key is not kept on a single system because there is a probability of attacking. It is distributed on some trusted systems according to threshold cryptography. Now once shares are distributed they must be refreshed otherwise attacker can easily achieve those shares and generate the key. The same work is represented here; once shares are distributed they must be refreshed after some period of time, so that long term protection against break ins can be achieved.
Keywords :
private key cryptography; public key cryptography; automated recovery; communication channel; key refreshing algorithm; long term protection; private-public key pair; proactive security; sensitive data; threshold cryptography; Computers; Cryptography; Operating systems; Polynomials; Protocols; Servers; Attacks; Distributed Cryptography; Proactive Security; Secret sharing; Share Refreshment; Threshold Cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
Type :
conf
DOI :
10.1109/ICECTECH.2011.5942087
Filename :
5942087
Link To Document :
بازگشت