Short Message Service (sms) security solution for mobile devices



Download 1,13 Mb.
Pdf ko'rish
bet32/51
Sana09.06.2022
Hajmi1,13 Mb.
#647072
1   ...   28   29   30   31   32   33   34   35   ...   51
Bog'liq
06Dec Ng Yu

Symmetric Key 
Length 
Asymmetric Key 
Length 
56 bits 
384 bits 
64 bits 
512 bits 
80 bits 
768 bits 
112 bits 
1792 bits 
128 bits 
2304 bits 
Table 2. Symmetric and Asymmetric Key Length Comparison 
Table 2 provides a reference for relative comparison of key lengths. 
However, this is still based on the current mathematical knowledge regarding 
factoring large numbers. Once a newer and faster method of factoring is 
discovered, the values in the table no longer hold. 
3. Key 
Management 
Key management is an important part of any encryption solution. The 
strongest algorithms and the longest keys are useless if the keys are not 
generated, distributed and destroyed in a secure manner. Stealing keys is an 
attractive option for the attacker because the attacker does not need to expend 
resources to break the encryption algorithm, if he can break the key generation 
algorithm. The attack of the COMP128 algorithm is an example of an attack on 
the key generation algorithm.
A big challenge in key generation is ensuring that the keys generated are 
truly random and thus not predictable. The difficulty depends on the key lengths 
and the frequency of key change. For One Time Pad, the keys are as long as the 
messages and the keys must never be repeated. This may be extremely difficult 
depending on the volume of traffic.
There are also known weak keys in certain algorithms. Therefore, after the 
key generation process, it is important that the keys be checked to ensure that 
they do not belong to the pool of known weak keys.


 40
After the keys have been generated, they must be distributed via a trusted 
communications channel. Key distribution for a large network can be 
cumbersome. For symmetric encryption, the number of key exchanges required 
in a network with 

users is 
n(n – 1)/2
. The key exchange for asymmetric 
encryption is simpler because the public key can be exchanged via a public 
network. However, mechanisms must be built into the system to ensure the 
authenticity of the public keys. 

Download 1,13 Mb.

Do'stlaringiz bilan baham:
1   ...   28   29   30   31   32   33   34   35   ...   51




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish