Open Access Open Access  Restricted Access Subscription Access

Key Management with Cryptography


Affiliations
1 Department of Computer Science & Engineering, RGPV University, Bhopal, India
2 Department of MCA, GGGC, RGPV University, Bhopal, India
3 Department of Computers, Saifia Science College, Bhopal - 462 001, India
 

In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. In current literature, essentially there exists two main approaches, namely the public key cryptography and identity-based(IDbased)cryptography. Unfortunately, they both have some inherent drawbacks. In the public key cryptography system, a certificate authority (CA) is required to issue certificates between users’ public keys and private key stoen sure their authenticity, whilst in an ID-based cryptography system, users’ private keys are generated by a key generation center (KGC), which means the KGC knows every users’ keys (the key escrow problem). To avoid these obstacles, Al-Riyami and Paterson proposed certificateless cryptography systems where the public keys do not need to be certified and the KGC does not know users’ keys. Essentially, certificateless cryptography relies between the public key cryptography and ID-based cryptography. In this work, we adopt this system’s advantage over MANET. To implement CL-PKE over MANET and to make it practical, we incorporate the idea of Shamir’s secret sharing scheme. The master secret keys are shared among some or all the MANET nodes. This makes the system self-organized once the network has been initiated. In order to provide more flexibility, we consider both a full distribution system and a partial distribution system. Furthermore, we carry out two simulations to support our schemes. We firstly simulate our scheme to calculate our encryption, decryption and key distribution efficiency. Then we also simulate our scheme with AODV to test the network efficiency. The simulations are performed over OPNET.

Keywords

Certificateless Cryptography, MANET, AODV, OPNET, Public Key Cryptography, Identity Based Cryptography, Secret Sharing.
User
Notifications
Font Size

Abstract Views: 207

PDF Views: 2




  • Key Management with Cryptography

Abstract Views: 207  |  PDF Views: 2

Authors

Syed Minhaj Ali
Department of Computer Science & Engineering, RGPV University, Bhopal, India
Satish V. Reve
Department of Computer Science & Engineering, RGPV University, Bhopal, India
Roohi Ali
Department of MCA, GGGC, RGPV University, Bhopal, India
Sana Iqbal
Department of Computers, Saifia Science College, Bhopal - 462 001, India

Abstract


In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. In current literature, essentially there exists two main approaches, namely the public key cryptography and identity-based(IDbased)cryptography. Unfortunately, they both have some inherent drawbacks. In the public key cryptography system, a certificate authority (CA) is required to issue certificates between users’ public keys and private key stoen sure their authenticity, whilst in an ID-based cryptography system, users’ private keys are generated by a key generation center (KGC), which means the KGC knows every users’ keys (the key escrow problem). To avoid these obstacles, Al-Riyami and Paterson proposed certificateless cryptography systems where the public keys do not need to be certified and the KGC does not know users’ keys. Essentially, certificateless cryptography relies between the public key cryptography and ID-based cryptography. In this work, we adopt this system’s advantage over MANET. To implement CL-PKE over MANET and to make it practical, we incorporate the idea of Shamir’s secret sharing scheme. The master secret keys are shared among some or all the MANET nodes. This makes the system self-organized once the network has been initiated. In order to provide more flexibility, we consider both a full distribution system and a partial distribution system. Furthermore, we carry out two simulations to support our schemes. We firstly simulate our scheme to calculate our encryption, decryption and key distribution efficiency. Then we also simulate our scheme with AODV to test the network efficiency. The simulations are performed over OPNET.

Keywords


Certificateless Cryptography, MANET, AODV, OPNET, Public Key Cryptography, Identity Based Cryptography, Secret Sharing.