نتایج جستجو برای: message authentication

تعداد نتایج: 99488  

2014
R. Saranya J. Hariharan

A vehicular ad hoc network (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to received message. In this paper, secure hash authentication protocol (SHAP) verifie...

2008
Yuan Xue

In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...

1997
Erez Petrank

The Cipher Block Chaining (CBC) Message Authentication Code (MAC) is an authentication method which is widely used in practice. It is well known that the naive use of CBC MAC for variable length messages is not secure, and a few thumb rules for the correct use of CBC MAC are known by \folklore". The rst rigorous proof of the security of CBC MAC, when used on xed length messages, was given only ...

2009
Yuan Xue

In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...

2003
Dr. Bin B. Zhu Dr. Mitchell

Most multimedia signals today are in digital formats which are easy to reproduce and modify without any trace of manipulations. In this chapter, we present a comprehensive review of current technologies for multimedia data authentication and tamper detection. We first introduce in Section 7.2 the problem issues and general requirements for a multimedia authentication system. This is followed in...

Journal: :Int. J. Comput. Math. 2008
Rongxing Lu Xiaodong Lin Zhenfu Cao Liuquan Qin Xiaohui Liang

Deniable authentication protocol is a new authentication mechanism in secure computer communication, which not only enables an intended receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. In this paper, based on the Diffie-Hellman algorithm, we propose a new simple deniable authentication protocol from a provably secu...

2008
Jonathan Katz Andrew Y. Lindell

We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender. We suggest aggregate MACs as an appropriate tool for au...

2006
Taketsugu Yao Shigeru Fukunaga Toshihisa Nakai

Due to the low-cost nature of sensor network nodes, we cannot generally assume the availability of a high-performance CPU and tamperresistant hardware. Firstly, we propose a reliable broadcast message authentication working under the above-mentioned circumstances. The proposed scheme, although based on symmetric cryptographic primitives, is secure against anyone who knew the message authenticat...

Journal: :The Journal of the Korean Institute of Information and Communication Engineering 2011

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید