Abstract | ||
---|---|---|
This paper proposes hash chain algorithm that generates more secure key than conventional method and secure encryption method that each key generated by hash chain algorithm is respectively applied to block. Also, we encrypt separate key using key separate method after authenticating user by user authentication method via on/off line, and attacker cannot get complete key although the key is disclosed by sending the key to client one by one. After we design and implement proposed system, we take experiment for a performance analysis using various size of digital content files. As a result, proposed system can securely transmit a key, and the key is encrypted not to decrypt whole data against key disclosure. Finally, the time for an encryption and decryption is analogous to conventional method when client system replays video file. |
Year | Venue | Keywords |
---|---|---|
2006 | INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | DRM, Symmetric key, Agent, PKI |
Field | DocType | Volume |
Key distribution,Key generation,Computer science,Computer security,Key encapsulation,Computer network,Encryption,Key authentication,Hash chain,Pre-shared key,Key (cryptography) | Conference | 6 |
Issue | ISSN | Citations |
2B | 1738-7906 | 1 |
PageRank | References | Authors |
0.35 | 2 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kun-Won Jang | 1 | 7 | 1.90 |
Chan-Kil Park | 2 | 1 | 0.35 |
Jung-Jae Kim | 3 | 343 | 27.42 |
Moon-Seog Jun | 4 | 5 | 2.88 |