
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
2025
Indexing Partners



















A Hybrid Approach to Key Verification -Strengthening Cloud-Based Systems
Author(s) | A.MEGHANA NAGA VIJAYA SRI, A.VYSHNAVI, B.ASHWINI, MS. G.PRIYANKA, DR. F.JERALD |
---|---|
Country | India |
Abstract | Hash-based key verification, leveraging the properties of cryptographic hash functions and the unpredictability inherent in data transmission, has attracted significant academic interest in recent years. Theoretical analyses have demonstrated its potential for secure and efficient key validation; however, challenges remain in bridging theoretical concepts with real-world applications. This document provides a comprehensive review of the hash-based key verification mechanism and investigates its practical constraints. Computational studies are conducted to evaluate and scrutinize various passive and aggressive threats. An advanced key verification framework utilizing stochastic data probes and incorporating user-induced entropy with transmission randomness is introduced to counteract active adversarial interventions. The analytical results suggest that the proposed framework achieves enhanced security resilience compared to existing methodologies that rely on continuous probes during active intrusions. Hash-based key validation, harnessing the attributes of cryptographic hash functions, introduces an innovative approach that can be seamlessly integrated into future communication infrastructures while maintaining robust security guarantees. This research explores and compares the verification efficiency derived from analyzing the entire data payload versus solely its statistical features, including received signal strength (RSS). Modern cryptographic techniques rely on the computational capacity of unauthorized entities. As technological advancements accelerate, ensuring the confidentiality of transmitted data becomes increasingly complex. On the other hand, an information-theoretic paradigm establishes a foundation for emerging coding strategies that maintain security regardless of an eavesdropper's processing capability. Wireless communication systems are prone to interception due to their inherent broadcast nature. Traditional encryption methods, often associated with excessive latency and uncertain confidentiality, are becoming less viable for protecting high-speed, dynamically changing wireless transmissions. In response, physical layer security (PLS) has emerged as a promising solution, attracting extensive attention from researchers and industry professionals alike. |
Keywords | Keywords: Hash-based Key Verification, Cryptographic, Hash Functions, Physical Layer Security (PLS), Wireless Communication Security, Diffie-Hellman Protocol, Internet of Things(IoT), Security |
Field | Engineering |
Published In | Volume 16, Issue 1, January-March 2025 |
Published On | 2025-03-28 |
Cite This | A Hybrid Approach to Key Verification -Strengthening Cloud-Based Systems - A.MEGHANA NAGA VIJAYA SRI, A.VYSHNAVI, B.ASHWINI, MS. G.PRIYANKA, DR. F.JERALD - IJSAT Volume 16, Issue 1, January-March 2025. DOI 10.71097/IJSAT.v16.i1.2773 |
DOI | https://doi.org/10.71097/IJSAT.v16.i1.2773 |
Short DOI | https://doi.org/g896f4 |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
