Lightweight DTLS Message Authentication Based on a Hash Tree
نویسندگان
چکیده
منابع مشابه
Lightweight CRC-based Message Authentication
Low-cost resource-constrained devices can allocate very limited resources for implementing security. At the same time, they still require some level of protection. In this paper, we present a lightweight message authentication scheme based on Cyclic Redundancy Check (CRC). The presented CRC inherits the implementation simplicity of the conventional CRC checksum except that the LFSR implementing...
متن کاملA remark on hash functions for message authentication
n A application of a special class of hash functions to cryptographic applications is considered in this paper. These hash functions arc used in cryptography to construct manipulation detection codes (MDCs), h’ h w ic arc added to messages to give some measure of assurance to the recipient that it has not been altered in transit. The basic idea is that a publicly known hash function is applied ...
متن کاملLightweight DTLS Implementation in CoAP-based IoT
Security is emerging as a key area of focus in the Internet of Things. Lightweight implementations of the required security features are the need of the hour considering the resource constrained nature of the underlying nodes and networks. At the same time, it is essential to ensure that such implementations are robust, reliable and efficient. This paper addresses this need by providing a frame...
متن کاملSquare Hash: Fast Message Authentication Via Optimized Universal Hash Functions?
This paper introduces two new ideas in the construction of fast universal hash functions geared towards the task of message authen-tication. First, we describe a simple but novel family of universal hash functions that is more eecient than many standard constructions. We compare our hash functions to the MMH family studied by Halevi and Krawczyk 13]. All the main techniques used to optimize MMH...
متن کاملKeying Hash Functions for Message Authentication
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many Internet applications and protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new constructions of message authentication schemes based on a cryptographic hash function. Our schemes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences
سال: 2015
ISSN: 1226-4717
DOI: 10.7840/kics.2015.40.10.1969