Secured Hash2 based Message Authentication Code using GUI Controls

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

UMAC: Message Authentication Code using Universal Hashing

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This specification describes how to generate an authentication tag using the UMAC message authentication algorithm. UMAC is designed to be very fast to compute in software on contemporary uniprocessors. Measured spe...

متن کامل

Lecture 9: Message Authentication Code

In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...

متن کامل

Lecture 10: Message Authentication Code

In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...

متن کامل

Code Based Hashing Technique for Message Authentication Algorithms

In Cryptography, hash functions play a fundamental role in mapping messages into hash codes, where hash codes are served as compact representative of input messages. The hash function is a many-to-one function. Same hash function can be generated from different input messages, implying that the existence of collisions. Cryptographic hash functions are used for data integrity in conjunction with...

متن کامل

A Message Authentication Code Based on Unimodular Matrix Groups

We present a new construction based on modular groups. A novel element of our construction is to embed each input into a sequence of matrices with determinant ±1, the product of which yields the desired mac. We analyze using the invertibility and the arithmetic properties of the determinants of certain types of matrices; this may be of interest in other applications. Performance results on our ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/13269-0772