Lightweight DTLS Message Authentication Based on a Hash Tree

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight CRC-based Message Authentication

Low-cost resource-constrained devices can allocate very limited resources for implementing security. At the same time, they still require some level of protection. In this paper, we present a lightweight message authentication scheme based on Cyclic Redundancy Check (CRC). The presented CRC inherits the implementation simplicity of the conventional CRC checksum except that the LFSR implementing...

متن کامل

A remark on hash functions for message authentication

n A application of a special class of hash functions to cryptographic applications is considered in this paper. These hash functions arc used in cryptography to construct manipulation detection codes (MDCs), h’ h w ic arc added to messages to give some measure of assurance to the recipient that it has not been altered in transit. The basic idea is that a publicly known hash function is applied ...

متن کامل

Lightweight DTLS Implementation in CoAP-based IoT

Security is emerging as a key area of focus in the Internet of Things. Lightweight implementations of the required security features are the need of the hour considering the resource constrained nature of the underlying nodes and networks. At the same time, it is essential to ensure that such implementations are robust, reliable and efficient. This paper addresses this need by providing a frame...

متن کامل

Square Hash: Fast Message Authentication Via Optimized Universal Hash Functions?

This paper introduces two new ideas in the construction of fast universal hash functions geared towards the task of message authen-tication. First, we describe a simple but novel family of universal hash functions that is more eecient than many standard constructions. We compare our hash functions to the MMH family studied by Halevi and Krawczyk 13]. All the main techniques used to optimize MMH...

متن کامل

Keying Hash Functions for Message Authentication

The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many Internet applications and protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new constructions of message authentication schemes based on a cryptographic hash function. Our schemes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences

سال: 2015

ISSN: 1226-4717

DOI: 10.7840/kics.2015.40.10.1969