Secure Message Authentication Process in Mobile Computing

Authors

  • Rojasri G  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • Roopakalaiyarasi V  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • Arulmozhi Arasi D S  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

Verification, Unconditional Guarantee, Computational Guarantee, Pervasive computing

Abstract

In frequent applications trust on the persistence of compact inventions that can interchange data and produce the communication networks. In a relevant part of such applications, the confidentiality and integrity of the exchanged messages are of particular attention. In this effort, we use two novel procedures for protecting message authentication codes and validating encrypted messages that are required to face the demands of mobile and pervasive computing. By taking the benefits of the reality that the report to be verified must also be encrypted, we use provably securing codes that will be productive than other codes. The secret intention behind our advance techniques is to make use of the security that can be issued by an encryption algorithm to plan additional protecting actions, as against to using other standalone securing primitives.

References

 [1] B. Alomair, A. Clark, and R. Poovendran, “The Power of Primes: Security of Authentication Based on a Universal Hash-Function Family,” J. Math. Cryptology, vol. 4,         no. 2, 2010.

[2] B. Preneel and P.V. Oorschot, “MDx-MAC and Building Fast MACs from Hash Functions,” Proc. 15th Ann. Int’l Cryptology Conf. Advances in Cryptology                      (CRYPTO ’95), vol. 963, pp. 1-14, 1995.

[3] J. Katz and Y. Lindell, Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.

[4] M. Furer, “Faster Integer Multiplication,” Proc. ACM Symp. Theory of Computing (STOC ’07), p. 66, 2007.

[5] P. Rogaway, M. Bellare, and J. Black, “OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption,” ACM Trans. Information and System Security, vol. 6, no. 3, pp. 365-403, 2003.


Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
Rojasri G, Roopakalaiyarasi V, Arulmozhi Arasi D S, " Secure Message Authentication Process in Mobile Computing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.168-171, March-April-2015.