International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 2 April-June 2025 Submit your research before last 3 days of June to publish your research paper in the issue of April-June.

A Hybrid Approach to Key Verification -Strengthening Cloud-Based Systems

Author(s) A.MEGHANA NAGA VIJAYA SRI, A.VYSHNAVI, B.ASHWINI, MS. G.PRIYANKA, DR. F.JERALD
Country India
Abstract Hash-based key verification, leveraging the properties of cryptographic hash functions and the unpredictability inherent in data transmission, has attracted significant academic interest in recent years. Theoretical analyses have demonstrated its potential for secure and efficient key validation; however, challenges remain in bridging theoretical concepts with real-world applications. This document provides a comprehensive review of the hash-based key verification mechanism and investigates its practical constraints. Computational studies are conducted to evaluate and scrutinize various passive and aggressive threats. An advanced key verification framework utilizing stochastic data probes and incorporating user-induced entropy with transmission randomness is introduced to counteract active adversarial interventions. The analytical results suggest that the proposed framework achieves enhanced security resilience compared to existing methodologies that rely on continuous probes during active intrusions. Hash-based key validation, harnessing the attributes of cryptographic hash functions, introduces an innovative approach that can be seamlessly integrated into future communication infrastructures while maintaining robust security guarantees. This research explores and compares the verification efficiency derived from analyzing the entire data payload versus solely its statistical features, including received signal strength (RSS).

Modern cryptographic techniques rely on the computational capacity of unauthorized entities. As technological advancements accelerate, ensuring the confidentiality of transmitted data becomes increasingly complex. On the other hand, an information-theoretic paradigm establishes a foundation for emerging coding strategies that maintain security regardless of an eavesdropper's processing capability. Wireless communication systems are prone to interception due to their inherent broadcast nature. Traditional encryption methods, often associated with excessive latency and uncertain confidentiality, are becoming less viable for protecting high-speed, dynamically changing wireless transmissions. In response, physical layer security (PLS) has emerged as a promising solution, attracting extensive attention from researchers and industry professionals alike.
Keywords Keywords: Hash-based Key Verification, Cryptographic, Hash Functions, Physical Layer Security (PLS), Wireless Communication Security, Diffie-Hellman Protocol, Internet of Things(IoT), Security
Field Engineering
Published In Volume 16, Issue 1, January-March 2025
Published On 2025-03-28
Cite This A Hybrid Approach to Key Verification -Strengthening Cloud-Based Systems - A.MEGHANA NAGA VIJAYA SRI, A.VYSHNAVI, B.ASHWINI, MS. G.PRIYANKA, DR. F.JERALD - IJSAT Volume 16, Issue 1, January-March 2025. DOI 10.71097/IJSAT.v16.i1.2773
DOI https://doi.org/10.71097/IJSAT.v16.i1.2773
Short DOI https://doi.org/g896f4

Share this