Implementation of Blom's key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]

Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom's Key pre-distribution uses an integer finite field which makes this scheme easy to be inte...

Ful tanımlama

Kaydedildi:
Detaylı Bibliyografya
Asıl Yazarlar: Udin, Md Nizam (Yazar), Mohd Amin, Farah Azaliney (Yazar), Abdul Malek, Aminah (Yazar), Zulkifili, Nur Annisa (Yazar), Ghazali, Nur Atiqah (Yazar), Mohd Ridzuwan, Siti Aisyah (Yazar)
Materyal Türü: Kitap
Baskı/Yayın Bilgisi: Penerbit UiTM, 2021-10.
Konular:
Online Erişim:Link Metadata
Etiketler: Etiketle
Etiket eklenmemiş, İlk siz ekleyin!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_49132
042 |a dc 
100 1 0 |a Udin, Md Nizam  |e author 
700 1 0 |a Mohd Amin, Farah Azaliney  |e author 
700 1 0 |a Abdul Malek, Aminah  |e author 
700 1 0 |a Zulkifili, Nur Annisa  |e author 
700 1 0 |a Ghazali, Nur Atiqah  |e author 
700 1 0 |a Mohd Ridzuwan, Siti Aisyah  |e author 
245 0 0 |a Implementation of Blom's key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.] 
260 |b Penerbit UiTM,   |c 2021-10. 
500 |a https://ir.uitm.edu.my/id/eprint/49132/1/49132.pdf 
520 |a Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom's Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom's. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom's Key pre-distribution scheme will be presented in this study. 
546 |a en 
690 |a Algebra 
690 |a Electronic data processing. Maple (Computer file) 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/49132/ 
787 0 |n https://mjoc.uitm.edu.my/ 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/49132/  |z Link Metadata