Efficient authentication for mobile and prevasive computing

Show simple item record

dc.contributor.author Tamboli, Mujib
dc.contributor.author Sayyed, Mohammed Novman Irfan (19DET18)
dc.contributor.author Shaikh, Adnan Farook (19DET19)
dc.contributor.author Shaikh, Asif Ahsan (19DET20)
dc.date.accessioned 2022-06-17T10:54:15Z
dc.date.available 2022-06-17T10:54:15Z
dc.date.issued 2022-05
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/3893
dc.description.abstract Message authentication is typically achieved by using message authentication codes (MACs) authenticated encryption or digital signatures. The message authentication code, also known as digital authenticator, is used as an integrity check based on a secret key shared by two parties to authenticate information transmitted betenthem. It is based on using a cryptographic hash or symmetric encryption algorithm. The authentication key is only shared by at least two parties or two communicating devices but it will fail in the existence of a third party since the algorithm will no longer be effective in detecting forgeries. In addition, the key must also be randomly generated to avoid its recovery through brute force searches and related key attacks designed to identify it from the messages transiting the medium. Securing the user message by providing authentication and security if the authenticated message must also be encrypted. With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. en_US
dc.language.iso en en_US
dc.publisher AIKTC en_US
dc.subject Project Report - EXTC en_US
dc.title Efficient authentication for mobile and prevasive computing en_US
dc.type Project Report en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


Advanced Search

Browse

My Account