DocumentCode :
1934812
Title :
Tesseract: A 4D symmetric key container for multimedia security
Author :
Alshahranil, Ali M. ; Walker, Stuart
Author_Institution :
Comput. Sci. & Electron. Eng., Univ. of Essex, Colchester, UK
fYear :
2015
fDate :
3-5 Feb. 2015
Firstpage :
139
Lastpage :
142
Abstract :
Real time applications (RTA) are application programs that function within a specific timescale. Voice over IP (VoIP) and video conferences are examples of RTA. Transmitting such data via open networks is risky. However, any security must be lightweight and cause no delay. Recently, many algorithms have been created, but very few are viable with RTA. In cryptography, `key space´ refers to the number of possible keys that can be used to generate the key from the keys container. In this paper, a tesseract is applied for the first time with RTA The tesseract functions with the suggested method to create a key that can generate 768!-bits. However, only three keys are selected from the tesseract key´s home, which are 128, 256 and 512-bits. Three different rounds will be utilized to create the key. This algorithm is considered to be fast and strong because the rounds and XOR-ing operation are lightweight and cheap.
Keywords :
Internet telephony; computer network security; cryptography; multimedia communication; real-time systems; telecommunication security; 4D symmetric key container; RTA; VoIP; Voice over IP; XOR-ing operation; cryptography; multimedia security; open networks; real time applications; video conferences; Ciphers; Computer science; Containers; Encryption; Multimedia communication; cryptography; cube; encryption key; shared secret key; tesseract;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Digital Information, Networking, and Wireless Communications (DINWC), 2015 Third International Conference on
Conference_Location :
Moscow
Print_ISBN :
978-1-4799-6375-1
Type :
conf
DOI :
10.1109/DINWC.2015.7054232
Filename :
7054232
Link To Document :
بازگشت