CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Cryptographic Key Generation based on Contextual Information: A Review

by Aparna A., Ajish S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 15
Year of Publication: 2016
Authors: Aparna A., Ajish S.
10.5120/ijca2016908123

Aparna A., Ajish S. . Cryptographic Key Generation based on Contextual Information: A Review. International Journal of Computer Applications. 134, 15 ( January 2016), 1-5. DOI=10.5120/ijca2016908123

@article{ 10.5120/ijca2016908123,
author = { Aparna A., Ajish S. },
title = { Cryptographic Key Generation based on Contextual Information: A Review },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 15 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number15/23987-2016908123/ },
doi = { 10.5120/ijca2016908123 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:16.682118+05:30
%A Aparna A.
%A Ajish S.
%T Cryptographic Key Generation based on Contextual Information: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 15
%P 1-5
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the capabilities of computing increasing by leaps and bounds, the need for trusted communication also rises. The present state of ensuring secure communication between devices largely relies on the use of cryptographic keys. The primitive and advanced key generation strategies involve the use of password only, biometric, quantum, PRNG technologies. Recently, the use of contextual information to generate highly secure keys has proven to be a realistic and unobstructed method in the field of cryptography. Contextual information like temperature, luminance and ambient audio may be used for this purpose. This paper presents a detailed survey on the cryptographic techniques for key generation based on contextual information. A brief comparison on the current techniques is also presented in this survey.

References
  1. Ngu Nguyen, Stephan Sigg, An Huynh, and Yusheng Ji, “Using ambient audio in secure mobile phone communication”, International Conference on Pervasive Computing and Communications, pp. 431-434, 2012
  2. Nguyen, Ngu, et al. “Pattern-based alignment of audio data for ad hoc secure device pairing”, Wearable Computers (ISWC), 2012 16th International Symposium on. IEEE, pp. 88-91, 2012.
  3. Sigg, Stephan, Dominik Schuermann, and Yusheng Ji. “Pintext: A framework for secure communication based on context”, Mobile and ubiquitous systems: Computing, networking, and services. Springer Berlin Heidelberg, pp. 314-325, 2012.
  4. D. Bichler, G. Stromberg, and M. Huemer, “Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks”, Proc. IEEE GlobeCom, pp. 177- 181, 2007.
  5. D. Bichler, G. Stromberg, M. Huemer, and M. Loew, “Key Generation Based on Acceleration Data of Shaking Processes”, Proc. Ninth Intl Conf. Ubiquitous Computing, J. Krumm, ed., pp. 304-317, 2007.
  6. Mathur, Suhas, et al. “Proximate: proximity-based secure pairing using ambient wireless signals.” Proceedings of the 9th international conference on Mobile systems, applications, and services. ACM, pp. 211-224, 2011.
  7. Amresh Nikam, Poonam Kapade, Sonali Patil,“Audio Cryptography: A(2,2) Secret Sharing for Wave File”,International Journal of Computer Science and Application Issue 2010.
  8. Alex Varshavsky,Anthony LaMarca,Eyal de Lara,“Enabling Secure and Spontaneous Communication between Mobile Devices using Common Radio Environment”, Eighth IEEE Workshop on Mobile Computing Systems and Applications.
  9. Stephan Sigg, Matthias Budde, Yusheng Ji, Michael Beigl,“Entropy of audio fingerprints for unobtrusive device authentication”,International and Interdisciplinary Conference on Modeling and Using Context 2011.
  10. Ngu Nguyen and Stephan Sigg, An Huynh, Yusheng Ji,“Pattern-based Alignment of Audio Data for Ad-hoc Secure Device Pairing”,2012 16th International Symposium on Wearable Computers.
  11. Ngu Nguyen, Stephan Sigg, An Huynh, Yusheng Ji,“Using ambient audio in secure mobile phone communication”,Work in Progress session at PerCom 2012, Lugano (19-23 March 2012),National Institute of Informatics (NII).
  12. Raviraj B. Vyavahare, Amit J. Bajaj, Hitesh P. Fuse, Mr. Pravin K. Patil,“Study of Secure Data Transmission Using Audio File”,International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 2, February 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Contextual Information Key Generation Data Encryption Ambient Audio Audio Fingerprinting