Professional Documents
Culture Documents
Algorithm:
Simulation Model
Simulation Analysis
Table 1 lists the results. We found that in each step the times required to generate
the cipher texts are short. Here, we choose IEEE 802.11b which is the worst one
among the three testes environments as an example. The costs spent in steps 1~3
are 0.34 sec, 0.12 sec and 0.34 sec, respectively. In the last step, we only spent 54
ms encode a 1200-bit plaintext.
Now, we can conclude that the SePem has many benefits. First, the system can be
adapted to any wireless networks that originally need to deliver encrypted TEKs or
other keys. Second, it spends very short time to generate ciphertexts on each key
exchange step. At last, the proposed scheme is very secure since K i, K j, and two
PRNSs are all individually generated by parties A and B. Besides, current sizes of
parameters are between 512 bits and 1024 bits in length. We can use a longer size,
like 2048 bits, for advanced use. In summary, we dare to say that our mechanism is
very suitable for implementing key management and delivery in wireless
environments.