Secure Message Authentication Process in Mobile Computing

Authors(3) :-Rojasri G, Roopakalaiyarasi V, Arulmozhi Arasi D S

In frequent applications trust on the persistence of compact inventions that can interchange data and produce the communication networks. In a relevant part of such applications, the confidentiality and integrity of the exchanged messages are of particular attention. In this effort, we use two novel procedures for protecting message authentication codes and validating encrypted messages that are required to face the demands of mobile and pervasive computing. By taking the benefits of the reality that the report to be verified must also be encrypted, we use provably securing codes that will be productive than other codes. The secret intention behind our advance techniques is to make use of the security that can be issued by an encryption algorithm to plan additional protecting actions, as against to using other standalone securing primitives.

Authors and Affiliations

Rojasri G
Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Roopakalaiyarasi V
Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Arulmozhi Arasi D S
Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Verification, Unconditional Guarantee, Computational Guarantee, Pervasive computing

 [1] B. Alomair, A. Clark, and R. Poovendran, “The Power of Primes: Security of Authentication Based on a Universal Hash-Function Family,” J. Math. Cryptology, vol. 4,         no. 2, 2010.

[2] B. Preneel and P.V. Oorschot, “MDx-MAC and Building Fast MACs from Hash Functions,” Proc. 15th Ann. Int’l Cryptology Conf. Advances in Cryptology                      (CRYPTO ’95), vol. 963, pp. 1-14, 1995.

[3] J. Katz and Y. Lindell, Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.

[4] M. Furer, “Faster Integer Multiplication,” Proc. ACM Symp. Theory of Computing (STOC ’07), p. 66, 2007.

[5] P. Rogaway, M. Bellare, and J. Black, “OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption,” ACM Trans. Information and System Security, vol. 6, no. 3, pp. 365-403, 2003.


Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 168-171
Manuscript Number : IJSRSET152256
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Rojasri G, Roopakalaiyarasi V, Arulmozhi Arasi D S, " Secure Message Authentication Process in Mobile Computing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.168-171, March-April-2015.
Journal URL : http://ijsrset.com/IJSRSET152256

Article Preview

Follow Us

Contact Us