نتایج جستجو برای: message authentication
تعداد نتایج: 99488 فیلتر نتایج به سال:
This paper presents an automation-considered logic of authentication for reasoning about principals’ belief on authentication and key distribution protocols. The so-called ASVO logic is based upon the famous SVO logic but designed in the slightly different way that minimizes the protocol idealization needs. For the purpose, message receiving and message recognition are reformulated in the simil...
We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The resulting polynomial hash value is encrypted again and becomes an authentication tag. We prove the prf-security of the EHE scheme and extend it to two authenticated encryption modes which follow the...
SCHLÜSSELWÖRTER Sicherheitsanforderung, Sicherheitsmechanismus, Vertraulichkeit, Integrität, Authentizität, Nichtabstreitbarkeit, Kryptosystem, Session-Key-Verfahren, One-WayHashfunktion, Trapdoor-One-Way-Funktion, Message Authentication Code, Digitale Signatur, Authentifizierungsprotokoll, Challenge&Response-Protokoll, Sicherheitsinfrastruktur, Trust Center, Public-KeyInfrastruktur, Originalität.
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility lies in the fact that with only one piece of authenticating data (e.g., digital signature or message authentication code) spanning all blocks, each block can be independently authenticated while ignoring the other blo...
In this paper, we explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authentication and random number generation. For parties equipped with a good source of randomness and a secure cryptographic primitive to authenticate messages, the literature of cryptography is rich with wellstu...
Data aggregation technology can effectively save network energy resource and storage resource so it is extensively applied in wireless sensor network. However, data aggregation technology also brings security problems and it demands that corresponding security schemes should be taken for precaution. Based on the requirement of the data aggregation security on WSN, combined with the features of ...
This is a proposal on the construction of a Message Authen-tication Code (MAC) based on Latin Squares. The design is inspired by Wegman-Carter construction which takes advantage of provable security. The MAC is described and its security is examined. It is also compared with other MACs and its advantages are shown.
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained m...
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is prese...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید