Placement of cryptographic key distribution within OSI: design alternatives and assessment
Computer Networks and ISDN Systems
Computer Security and Industrial Cryptography: State of the Art and Evolution: ESAT Course, Leuven, Belgium, May 21-23, 1991
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Design of a secure chat application based on AES cryptographic algorithm and key management
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Hi-index | 0.00 |
In this article, a study is presented that aims at the development of a prototype system for the secure real-time exchange of messages between users of workstations connected to the same TCP/IP network. The security is provided based on the AES prototype cryptographic algorithm. An advanced key management scheme is used within this system that enhances the security of the system, reduced the effects of possible security breaches and simultaneously hides from users the unnecessary complexity related to handling multiple encryption keys. The scope of application is military units and is intended to become the basis for the design and development of an integrated framework for the exchange of secure messages between different sites of military or other organizations that are concerned about information security. The present design is limited in its application to local area networks only. There are however no fundamental restrictions and an expansion to wide area networks and the internet is also possible. The design of the application is firstly presented. Problems of security and ease of use that are related to the management of the secret encryption keys are explained. A solution is hence presented for these problems, that is based on an innovative scheme for key storage and management. The design and implementation of the application is presented in detail along with description of its basic functionality. The plans for application and further development of the application are described and conclusions are finally drawn.