Date of Submission

2-28-2009

Date of Award

2-28-2010

Institute Name (Publisher)

Indian Statistical Institute

Document Type

Doctoral Thesis

Degree Name

Doctor of Philosophy

Subject Name

Cryptology

Department

Applied Statistics Unit (ASU-Kolkata)

Supervisor

Roy, Bimal Kumar (ASU-Kolkata; ISI)

Abstract (Summary of the Work)

From time immemorial people have used cryptography for secure communication. Cryptography has decided the fate of many kings and queens as well as the outcome of various wars. It has become all the more important nowadays, with the growing need of electronic communication. We now live in a society where electronic networks pervade all aspects of our professional and private lives. We all use cryptography when we do bank transfers by ATM, or SWIFT, while using the mobile phones and i-phones, SSL protocols or using password protected machines. Though electronic communication is fast and easy, it is vulnerable to security breeches, which are not so widespread in the traditional counterparts. For example we consider writing a letter. A hand-written letter is normally posted in a sealed envelop and delivered to a specified address by the postal service. To read the contents of the letter, the adversary must break open the seal. The recipient can inspect the envelope for damage and can make out if the letter was tampered with by simply inspecting the postmark or the handwriting. However an email is not secure. It passes through a large network of computers. At each router there is a chance of being intercepted. The contents may be read, altered, copied. The recipient has no idea of whether the information has been intercepted. Same situation arises when we transfer money by ATMs, or SWIFT transfers.Cryptography is essentially a collection of mathematical techniques, algorithms and protocols used to render the core information assurance services that are required in electronic communications. The chief services of any cryptographic protocol are confidentiality (hiding the data from the unauthorized users), data integrity (protecting data from manipulation), authentication(verifying the identity), non-repudiation(preventing malicious users to hide their activity).Most cryptographic mechanisms rely on a basic components called keys, which are essentially numbers selected at random from a large space. The security of cryptographic mechanisms rely on the security of the keys contained therein. Since keys form the building block of many cryptographic systems, the secure management of keys form an essential building block of many cryptosystems. The phrase key management describes the entire life cycle of keys, including key generation, methods by which it is sent to the relevant users of the system (key establishment), the techniques that are used to change and refresh it, also called key update and ultimately the means by which it is deleted at the end of its usage calledkey destruction.According to the nature of keys, cryptographic mechanisms can be divided into two broad categories- symmetric mechanisms, in which the same secret key is used for encryption by the sender and decryption by the receiver, and publickey mechanisms in which the sender encrypts the information using a public key. However to decrypt the contents, the receiver has to use her own private keys. There are some mechanisms where both symmetric and public-key mechanisms are used together. Generally public key mechanisms involve huge computational costs. Hence in areas of applications where resources are constrained, symmetric key mechanisms are preferred. One such area of application is sensor networks. Before discussing about sensor networks we look at the key establishment problem in general and key predistribution in particular.

Comments

ProQuest Collection ID: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:28843426

Control Number

ISILib-TH363

Creative Commons License

Creative Commons Attribution 4.0 International License
This work is licensed under a Creative Commons Attribution 4.0 International License.

DOI

http://dspace.isical.ac.in:8080/jspui/handle/10263/2146

Included in

Mathematics Commons

Share

COinS