Security Protocol of Keys Management System for Transmission Encrypted Data

Full Text (PDF, 749KB), PP.10-17

Views: 0 Downloads: 0


Rasha Subhi Ali 1,* Alaa Kadhim F. 1

1. Computer Sciences Department, University of technology/ Baghdad, Iraq

* Corresponding author.


Received: 26 Jun. 2017 / Revised: 23 Jul. 2017 / Accepted: 10 Aug. 2017 / Published: 8 Jan. 2018

Index Terms

Key management, encryption, decryption, secure data retrieval and Kerberos protocol


One of the essential obstacles for the deployment of multicast is the lack of protection. And in multicast security, key management for securing organization or group communication is an important area that desires to be addressed. This paper will give an overview of four key management methods and Kerberos protocol. Cryptographic methods are frequently used for secure Data transmission wireless networks. Most cryptographic approaches can be symmetric and asymmetric, depending on the manner of the utilized keys. There are many kinds of key management methods which have been suggested for secure data transmission. This research includes a study of different key management methods to find an efficient key management for Secure and Reliable data transmission in the network. The experimental results showed that the fourth method represents the optimal key management method because it was providing a more secure way for the transmitted data, and the total time for data retrieval was (314.065, 376.119, 590.348, and 474.881) for the four key management methods sequentially to retrieve 71923records. The first three key management methods depend on symmetric key cryptography and the fourth key management method is a hybrid method, it was dependent on symmetric and asymmetric key cryptography, symmetric in the case of using user shared key and asymmetric in case of using server private key and this was unknown for any one.

Cite This Paper

Rasha Subhi Ali, Alaa Kadhim F.,"Security Protocol of Keys Management System for Transmission Encrypted Data", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.1, pp.10-17, 2018. DOI:10.5815/ijcnis.2018.01.02


[1]Gupta V., Singh G. and Gupta R., “ Advance Cryptography Algorithm for Improving Data Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012 ISSN: 2277 128X.
[2]Awad Al-Hazaimeh O. Mohammad, “A New Approach For Complex Encrypting and Decrypting Data”, International Journal of Computer Networks & Communications (IJCNC), Vol.5, No.2, March 2013.
[3]Hamdy M. Mousa, " DNA-Genetic Encryption Technique ", I. J. Computer Network and Information Security, 2016, 7, 1-9 Published Online July 2016 in MECS ( DOI: 10.5815/ijcnis.2016.07.01
[4]Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, Fifth edition, CRC Press, Inc, 2001.
[5]Barker E., Barker W., Burr W., Polk W., and Smid M., “Computer Security”, National Institute of Standards and Technology, NIST Special Publication 800-57, July 2012.
[6]Chandramouli R., Iorga M., and Chokhani S., “Cryptographic Key Management Issues & Challenges in Cloud Services”, National Institute of Standards and Technology, NISTIR 7956, September 2013.
[7]Yashaswini J, " Key Distribution for Symmetric Key Cryptography: A Review", International Journal of Innovative Research in Computer and Communication Engineering, ISSN(Online): 2320-9801, ISSN (Print): 2320-9798, Vol. 3, Issue 5, May 2015.
[8]Abdalla Michel, Fouque Pierre-Alain and Pointcheval David , " Password-Based uthenticated Key Exchange in the Three-Party Setting", IEE Proceedings - Information Security, Volume 153, Issue 1, March 2006, p. 27–39, DOI: 10.1049/ip-ifs:20055073 , Print ISSN 1747-0722, Online ISSN 1747-0730.
[9]Tsai Chwei-Shyong, Lee Cheng-Chi and Hwang Min-Shiang,"Password Authentication Schemes: Current Status and Key Issues", International Journal of Network Security, Vol.3, No.2, PP.101–115, Sept. 2006 (
[10]Stallings W., "Cryptography and Network Security Principles and Practice", Sixth Edition, Pearson Education, Inc., 2014.
[11]Jaydeep Sen, “A survey on Wireless Sensor Network Security”, Technical Report 55-77, International Journal of Communication Networks and Information Security (IJCNIS) Vol 1, No2 August 2009.