skip to main content
10.1145/3647444.3652481acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Evaluating Key Management Strategies for Applied Cryptography Protocols

Published: 13 May 2024 Publication History

Abstract

In the virtual world, the protection of statistics is becoming increasingly essential for corporations and individuals. Cryptography techniques offer a valuable method to prevent malicious actors from gaining unauthorized access to statistics. However, practical implementations of cryptography protocols depend on cozy essential control, which can be challenging. This paper examines the critical control strategies for famous cryptography protocols and evaluates their relative strengths and weaknesses. It also seems that procedures to mitigate the dangers of using cryptographic keys, with crucial rotation and strong get entry to manage. Additionally, the paper considers realistic issues for deploying and managing cryptographic keys throughout exclusive use cases. This paper comprehensively evaluates essential control techniques for applied cryptography protocols. It elucidates diverse methods for establishing and managing cryptographic keys: generation and distribution, storage, and revocation. The goal is to assess the relative effectiveness of these techniques in an actual usage environment. To achieve this, the authors appoint a formal analysis of critical control fashions and their associated safety and trust mechanisms and offer an empirical assessment of the usage of two exclusive processes: experimental-pushed and code-based. The experimental-pushed method is carried out on a ridicule machine and examines the security of the critical thing management techniques in an actual utilization environment. the code-primarily based approach verifies the security, reliability, and accuracy of a gadget's key management protocols. Furthermore, a contrast of the two techniques is carried out to offer a comprehensive assessment of the techniques. The outcomes of the evaluation and assessment both demonstrate the effectiveness of the applied cryptography protocols and provide insights into the key management strategies' effectiveness in more than a few surroundings.

References

[1]
W. (2023). On the Development of a Protection Profile Module for Encryption Key Management Components. IEEE Access, 11, 9113-9121.
[2]
Jain, R., & Varshney, M. (2023). A Critical Study on Group Key Management Protocols and Security Aspects For Non-Networks. Journal of Applied Engineering and Technological Science (JAETS), 4(2), 783-794.
[3]
Anitha, C., Priscila, S. S., Mahaveerakannan, R., & Balakrishnan, B. (2023, March). An Efficient Secure Routing and Hierarchical Approach to Elliptic Curve Cryptography Combined with Distributed Group Key Management. In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 2208-2212). IEEE.
[4]
Edris, E. K. K., Aiash, M., Khoshkholghi, M. A., Naha, R., Chowdhury, A., & Loo, J. (2023). Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things, 100913.
[5]
Surve, T., & Khandelwal, R. (2023). The Emergence of Cryptography in Blockchain Technology. In Concepts, Technologies, Challenges, and the Future of Web 3 (pp. 47-63). IGI Global.
[6]
Maakar, Sunil Kr, Manju Khurana, Chinmay Chakraborty, Deepak Sinwar, and Durgesh Srivastava. "Performance evaluation of AODV and DSR routing protocols for flying ad hoc network using highway mobility model." Journal of Circuits, Systems and Computers 31, no. 01 (2022): 2250008.
[7]
Sheenam, and Durgesh Srivastava. "Dwindling of interference by adopting MRMC technique in WMN." In AIP Conference Proceedings, vol. 2576, no. 1. AIP Publishing, 2022.
[8]
Natarajan, R., Lokesh, G. H., Flammini, F., Premkumar, A., Venkatesan, V. K., & Gupta, S. K. (2023). A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0. Infrastructures, 8(2), 22.
[9]
Tang, Z., Zhang, P., Krawec, W. O., & Wang, L. (2022). Quantum networks for resilient power grids: Theory and simulated evaluation. IEEE Transactions on Power Systems, 38(2), 1189-1204.
[10]
William, P., Choubey, A., Chhabra, G. S., Bhattacharya, R., Vengatesan, K., & Choubey, S. (2022, March). Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content. In 2022 International conference on electronics and renewable systems (ICEARS) (pp. 918-922). IEEE.
[11]
Kore, A., & Patil, S. (2022). Cross layered cryptography based secure routing for IoT-enabled smart healthcare system. Wireless Networks, 1-15.
[12]
Al-Zubaidie, M. (2023). Implication of lightweight and robust hash function to support key exchange in health sensor networks. Symmetry, 15(1), 152.
[13]
Ramkumar, M., Logeshwaran, J., & Husna, T. (2022). CEA: Certification based encryption algorithm for enhanced data protection in social networks. Fundamentals of Applied Mathematics and Soft Computing, 1, 161-170.
[14]
Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, “Performance Evaluation of Entropy Based Graph Network Intrusion Detection System (E-Ids)”, in Jour of Adv Research in Dynamical & Control Systems, Vol.- 11, 02-Special Issue, 2019
[15]
Durgesh Srivastava, Nachiket Sainis and Dr. Rajeshwar Singh, “Classification of various Dataset for Intrusion Detection System”, in International Journal of Emerging Technology and Advanced Engineering, Volume 8, Issue 1, January 2018.
[16]
Durgesh Srivastava, Rajeshwar Singh, Vikram Singh, “An Intelligent Gray Wolf Optimizer: A Nature Inspired Technique in Intrusion Detection System (IDS)”, in Journal of Advancements in Robotics. 2019; 6(1): 18–24p
[17]
Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, “Analysis of different Hybrid methods for Intrusion Detection System,” International Journal Of Computer Sciences And Engineering 7(5):757-764, May 2019
[18]
Sankar, S. M., Revathi, S. T., & Thiagarajan, R. (2023). Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes. Computer Systems Science & Engineering, 45(1).
[19]
Xue, X., Shanmugam, R., Palanisamy, S., Khalaf, O. I., Selvaraj, D., & Abdulsahib, G. M. (2023). A hybrid cross layer with harris-hawk-optimization-based efficient routing for wireless sensor networks. Symmetry, 15(2), 438.
[20]
Jammula, M., Vakamulla, V. M., & Kondoju, S. K. (2022). Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment. Journal of Interconnection Networks, 22(Supp01), 2141031.

Index Terms

  1. Evaluating Key Management Strategies for Applied Cryptography Protocols

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
    November 2023
    1215 pages
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 May 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICIMMI 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 15
      Total Downloads
    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media