Dynamic Secrets
   HOME

TheInfoList



OR:

Dynamic Secrets is a novel
key management Key management refers to management of Key (cryptography), cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic ...
scheme for
secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
s. It was proposed by Sheng Xiao, Weibo Gong, and Don Towsley. The first academic publication had been nominated for INFOCOM 2010 best paper award.Xiao, Sheng, Weibo Gong, and Don Towsley.
Secure wireless communication with dynamic secrets
" INFOCOM, 2010 Proceedings IEEE. IEEE, 2010.
In 2012 a monograph was published by
Springer Springer or springers may refer to: Publishers * Springer Science+Business Media, aka Springer International Publishing, a worldwide publishing group founded in 1842 in Germany formerly known as Springer-Verlag. ** Springer Nature, a multinationa ...
to extend this scheme to a framework. Dynamic secrets can be applied to all bi-directional communication systems and some single-directional communication systems to improve their
communications security Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the North Atlantic Treaty Organization ...
. There are three main benefits: 1. The
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
and
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
keys are rapidly and automatically updated for any pair of communication devices. 2. The key update process binds to the communication process and incurs negligible computing and bandwidth cost. 3. The use a cloned key in either authentication or in encrypted communication is guaranteed to be detected. This detection has no false positives and does not cost any computing/networking resources. (Dynamic secrets automatically breaks the secure communication whenever a clone key and the legitimate key co-exist. To find out who is the attacker is, however, takes such resources.)


Implementation

1
Infisical Dynamic Secrets


References

Access control Key management {{crypto-stub