Hybrid cryptography key management. Page: 3 of 37
This report is part of the collection entitled: Office of Scientific & Technical Information Technical Reports and was provided to UNT Digital Library by the UNT Libraries Government Documents Department.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
SAND2003-4105
Unlimited Release
Printed November 2003
Hybrid Cryptography Key Management
Cheryl Beaver, Michael Collins, Timothy Draelos,
Donald Gallup, William Neumann, and Mark Torgerson
Cryptography and Information Systems Surety Department
Sandia National Laboratories
P.O. Box 5800
Albuquerque, NM 87185-0785
{cbeaver, mjcolli, tjdrael, drgallu, wneuman, mdtorge}@sandia.gov
Abstract
Wireless communication networks are highly resource-constrained; thus many
security protocols which work in other settings may not be efficient enough for
use in wireless environments. This report considers a variety of cryptographic
techniques which enable secure, authenticated communication when resources
such as processor speed, battery power, memory, and bandwidth are tightly
limited.3
Upcoming Pages
Here’s what’s next.
Search Inside
This report can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Report.
Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph & Beaver, Cheryl Lynn. Hybrid cryptography key management., report, November 1, 2003; United States. (https://digital.library.unt.edu/ark:/67531/metadc889722/m1/3/: accessed April 25, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; crediting UNT Libraries Government Documents Department.