نتایج جستجو برای: message authentication

تعداد نتایج: 99488  

Journal: :IACR Cryptology ePrint Archive 2013
Aysajan Abidin Jan-Åke Larsson

Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman&Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal2 hash function family...

2013
Mojtaba Sadeghi Mohammad V. Malakooti

This paper presents a secure authentication method for Mobile IPv6. As a default IPsec is used for secure signaling messages between the Mobile Node and other agents in Mobile IPv6 networks. Mobile IPv6 message transactions include the Binding Updates and Acknowledgement messages as well. We propose a new mechanism for securing Mobile IPv6 signaling between Mobile Node and other agents. The pro...

2012
Chien-Lung Hsu Yu-Hao Chuang

An authentication protocol allows on-line service providers to validate the identity or legitimacy of a logging user. Once passing the verification, an authorized user can obtain useful and valuable resource or services from the service provider through Internet conveniently. However, most the current authentication protocols cannot protect user’s privacy perfectly. To improve this deficiency, ...

2015
K. Sudha K. Radha

VANET is a subclass of MANET in which each vehicle acts as a node. In VANET Road Side Units (RSUs) are responsible for distributing group private keys and managing vehicles in a localized manner for every 100 to 300 m. Then, use a Hash Message Authentication Code (HMAC) to avoid time consuming CRL checking and to ensure the integrity of messages. Cooperativemessage authentication scheme is main...

2002
Moni Naor

Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some applications, it might be undesirable in others. Two related notions of authentication are: Deniable Authentication (see Dwork, Naor and Sahai [25]) and Ring Signatures (see Rivest, Shamir and Tauman [38]). In this paper we show how to combine these notions and achie...

Journal: :I. J. Network Security 2009
Zhenfu Cao

The notion of deniable authentication protocol was introduced in 1998 by Dwork et al. [11] and Aumann and Rabin [1, 2] independently. As a new cryptographic authentication protocol, a deniable authentication protocol enables an intended receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Over the past years, many deniable a...

1995
Shahram Bakhtiari Reihaneh Safavi-Naini Josef Pieprzyk

We give a new deenition of keyed hash functions and show its relation with strongly universal hash functions and Cartesian authenti-cation codes. We propose an algorithm for a secure keyed hash function and present preliminary result on its performance. The algorithm can be used for fast (about twice the speed of MD5) and secure message authentication.

Journal: :I. J. Network Security 2008
Praveen Gauravaram Shoichi Hirose Suganya Annadurai

In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by Bellare, Canetti and Krawczyk. First, we provide security analysis of NMAC using weaker assumptions than stated in its proof of security. This analysis shows that, theoretically, one cannot further weaken the assumptio...

Journal: :J. Mathematical Cryptology 2012
Neal Koblitz Alfred Menezes

HMAC is the most widely-deployed cryptographic-hash-function-based message authentication code. First, we describe a security issue that arises because of inconsistencies in the standards and the published literature regarding keylength. We prove a separation result between two versions of HMAC, which we denote HMAC and HMAC, the former being the real-world version standardized by Bellare et al...

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید