
Hybrid cryptography key management.
Author(s) -
Timothy J. Draelos,
Mark Dolan Torgerson,
William Douglas Neumann,
Donald R. Gallup,
Michael J. Collins,
Cheryl Beaver
Publication year - 2003
Language(s) - English
Resource type - Reports
DOI - 10.2172/918318
Subject(s) - computer science , cryptography , key management , computer network , wireless , key (lock) , cryptographic protocol , wireless network , bandwidth (computing) , public key cryptography , computer security , encryption , telecommunications
Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited