IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET152256                                                     

Secure Message Authentication Process in Mobile Computing


Rojasri G, Roopakalaiyarasi V, Arulmozhi Arasi D S
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
In frequent applications trust on the persistence of compact inventions that can interchange data and produce the communication networks. In a relevant part of such applications, the confidentiality and integrity of the exchanged messages are of particular attention. In this effort, we use two novel procedures for protecting message authentication codes and validating encrypted messages that are required to face the demands of mobile and pervasive computing. By taking the benefits of the reality that the report to be verified must also be encrypted, we use provably securing codes that will be productive than other codes. The secret intention behind our advance techniques is to make use of the security that can be issued by an encryption algorithm to plan additional protecting actions, as against to using other standalone securing primitives.

Rojasri G, Roopakalaiyarasi V, Arulmozhi Arasi D S

Verification, Unconditional Guarantee, Computational Guarantee, Pervasive computing


 [1] B. Alomair, A. Clark, and R. Poovendran, “The Power of Primes: Security of Authentication Based on a Universal Hash-Function Family,” J. Math. Cryptology, vol. 4,         no. 2, 2010.

[2] B. Preneel and P.V. Oorschot, “MDx-MAC and Building Fast MACs from Hash Functions,” Proc. 15th Ann. Int’l Cryptology Conf. Advances in Cryptology                      (CRYPTO ’95), vol. 963, pp. 1-14, 1995.

[3] J. Katz and Y. Lindell, Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.

[4] M. Furer, “Faster Integer Multiplication,” Proc. ACM Symp. Theory of Computing (STOC ’07), p. 66, 2007.

[5] P. Rogaway, M. Bellare, and J. Black, “OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption,” ACM Trans. Information and System Security, vol. 6, no. 3, pp. 365-403, 2003.


Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
168-171 IJSRSET152256   Technoscience Academy

Cite This Article

Rojasri G, Roopakalaiyarasi V, Arulmozhi Arasi D S, "Secure Message Authentication Process in Mobile Computing", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.168-171, March-April-2015.
URL : http://ijsrset.com/IJSRSET152256.php