Filters








352 Hits in 3.4 sec

A Review Study on Secure Authentication in Mobile System

Ahitha. H.S, Deepa. A.J
2014 International Journal of Computer Applications Technology and Research  
The messages to be authenticated must also be encrypted using the secure authentication codes that are more efficient than message authentication codes.  ...  Security model should adjust with various capability requirements and security requirements of a mobile system This paper provides a survey on security in mobile systems  ...  The algorithms are of two types as Symmetric algorithms and Asymmetric algorithms. Symmetric algorithms uses same key for both encryption and decryption.  ... 
doi:10.7753/ijcatr0310.1008 fatcat:zo2g76qdajfsriqovn2nb6ckly

Using quantum key distribution for cryptographic purposes: a survey [article]

Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev (+9 others)
2014 arXiv   pre-print
for which the requirements, the context of use and the security properties can vary.  ...  It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives.  ...  A also acknowledges enlightning discussions with Sylvain Guilley, Philippe Hoogsvorst and Jean-Luc Danger about side-channel attacks on cryptographic hardware.  ... 
arXiv:quant-ph/0701168v3 fatcat:j3wuwqjuarav3ft6chdvdsaw5a

Verified Reference Implementations of WS-Security Protocols [chapter]

Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon
2006 Lecture Notes in Computer Science  
We illustrate the use of our reference implementation through examples drawn from the sample applications included with WSE and WCF. We formally verify their security properties.  ...  Applications written using this library can interoperate with other compliant web services, such as those written using Microsoft WSE and WCF frameworks.  ...  Acknowledgements Stephen Tse, co-author of our previous paper [7] , participated in the design of fs2pv, and completed its original implementation, during his internship at Microsoft Research.  ... 
doi:10.1007/11841197_6 fatcat:nnh3szsbb5fcfc7oy4i226rk2e

Symmetric and Asymmetric Encryption

Gustavus J. Simmons
1979 ACM Computing Surveys  
This paper opens with a brmf dmcussion of encryptmn principles and then proceeds to a comprehensive discussion of the asymmetric encryptmn/decryption channel and its application m secure communmations.  ...  Not only is an asymmetric encryption system one in whmh the transmitter and receiver keys are different, but in addition it Is computatmnally mfeaslble to compute at least one from the other.  ...  A secondary objective has been to draw analogies between coding theory and encryption theory in order to clarify the concepts of secrecy and authentication.  ... 
doi:10.1145/356789.356793 fatcat:dueqqh5tn5frfnm5hkjbqzazdy

The Case for Quantum Key Distribution [chapter]

Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public  ...  key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.  ...  Acknowledgements The authors gratefully acknowledge helpful discussions with Romain Alléaume, Daniel J. Bernstein  ... 
doi:10.1007/978-3-642-11731-2_35 fatcat:dex2x3w2yngjjh5qjugs4o4dvm

Commitment and authentication systems

Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
2009 Designs, Codes and Cryptography  
relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an authentication  ...  scheme and an unconditionally secure cipher system.  ...  We show that an unconditionally secure commitment scheme with trusted initializer can be built from • a composition of an unconditionally secure authentication code without secrecy, without splitting and  ... 
doi:10.1007/s10623-009-9303-1 fatcat:shc4jf3kw5bkdfoovlc5g7qfr4

Commitment and Authentication Systems [chapter]

Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
2009 Lecture Notes in Computer Science  
relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an authentication  ...  scheme and an unconditionally secure cipher system.  ...  We show that an unconditionally secure commitment scheme with trusted initializer can be built from • a composition of an unconditionally secure authentication code without secrecy, without splitting and  ... 
doi:10.1007/978-3-642-10230-1_1 fatcat:qlc44i7wtnbnxm2upahkouv2ee

Using Hash-Based Signatures to Bootstrap Quantum Key Distribution [article]

Sébastien Kunz-Jacques, Paul Jouguet
2013 arXiv   pre-print
This channel is usually created on top of an un-authenticated communication medium using unconditionally secure Message Authentication Codes (MAC) and an initial common secret.  ...  with a composable security proof in a secure manner.  ...  In realistic deployments of QKD however, it will not be used stand-alone, encrypting traffic using one-time pad, and ensuring its integrity using unconditionally secure Message Authentication Codes, but  ... 
arXiv:1109.2844v3 fatcat:rbxcwfmka5ghfno7t6h6coblri

Smart Home Survey on Security and Privacy [article]

Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Łukasz Krzywiecki, Nalini Venkatasubramanian
2019 arXiv   pre-print
This article shows security requirements and threats to a smart home and focuses on a privacy-preserving security model.  ...  Security and privacy are two prime concern in smart home networks. A threat-prone smart home can reveal lifestyle and behavior of the occupants, which may be a significant concern.  ...  D j forward an encrypted message with the exponent g y , signed exponents (g x , g y ), and the Message Authentication Code (MAC) over identity j (STEP 2).  ... 
arXiv:1904.05476v2 fatcat:j76pppfzkjgb3hcifdvj34pkea

Review on Design and Implementation of Hop to Hop Message Authentication and Source Privacy in Wireless Sensor Networks
IJARCCE - Computer and Communication Engineering

Dipika R. Bisne, Mr. Punesh U. Tembhare
2015 IJARCCE  
The symmetric-key based approach has complicated key management and lacks of ways.  ...  The sender uses shared key to generate a message authentication code for each transmitted message.  ...  This problem solved by author is unconditionally or cryptographically secure based on one time used key or public keys .Here author actually encrypt the message with intended recipient public keys to ensure  ... 
doi:10.17148/ijarcce.2015.4136 fatcat:7zrtwprfmjgdblzmqyqe6fsjua

Non-interactive conference key distribution and its applications

Reihaneh Safavi-Naini, Shaoquan Jiang
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
We also consider composition of a NICKDS with a secure (CCA2 secure) encryption system and show this results in a broadcast encryption system (BES) that is CCA2 secure.  ...  First, we compose a secure NICKDS with a secure MAC by using the key obtained from the NICKDS as the MAC key, and show that this results in a ring authentication that guarantees authenticity of the received  ...  In [31] unconditionally secure ring authentication was pro-posed and a generic construction by composing a NICKDS and an authentication code was given.  ... 
doi:10.1145/1368310.1368349 dblp:conf/ccs/Safavi-NainiJ08 fatcat:hv6vxya6hfcodpyaq7ghoqruum

Uncloneable Encryption [article]

Daniel Gottesman
2004 arXiv   pre-print
While the main results apply to a one-time key with unconditional security, I also show uncloneable encryption remains secure with a pseudorandom key.  ...  I prove that any authentication scheme for quantum states acts as a secure uncloneable encryption scheme.  ...  Acknowledgements I would like to thank Claude Crépeau, Hoi-Kwong Lo, Dominic Mayers, and Adam Smith for helpful discussions.  ... 
arXiv:quant-ph/0210062v2 fatcat:vhoznekzbzgshes4r5mzf7esra

Unconditionally secure ring authentication

Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
We propose ring authentication in unconditionally secure setting.  ...  The sender will be unconditionally secure even if the receiver has corrupted up to c users and has access to up to past messages in the system.  ...  PRELIMINARIES Authentication Code Unconditionally secure message authentication systems are realized by authentication codes (A-codes).  ... 
doi:10.1145/1229285.1229310 dblp:conf/ccs/Safavi-NainiWD07 fatcat:cl76hfnud5bx5bbhw5mvnvbfq4

Cryptographic Primitives for Information Authentication — State of the Art [chapter]

Bart Preneel
1998 Lecture Notes in Computer Science  
class can be divided into Manipulation Detection Codes (MDCs, also known as one-way and collision resistant hash functions) and Message Authentication Codes (or MACs).  ...  This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signature schemes; the first  ...  -The first approach is analogous to that of a symmetric cipher, where the secrecy of large data quantities is based on the secrecy and authenticity of a short key.  ... 
doi:10.1007/3-540-49248-8_3 fatcat:7ttx7pnr4vgb3ipgbs47fr2jre

A Novel Approach to Communicate Secret Message between Users Using Sponge Function Technique on NTRU

S. Varaprasad, K. Venkata Rao, P.S. Avadhani
2013 International Journal of Science and Engineering  
In proposed work we propose how the group communication establishes registration of users, entry and exit of a user. The encryption and decryption algorithm are used between sender and receiver.  ...  In this paper an introduction part which briefs regarding sponge functions, key distribution centre, group communication and NTRU, key generation authentication, in literature review we describe about  ...  It is however possible to use classical symmetric-key encryption and authentication schemes, that are not unconditionally secure, to build a Key Establishment scheme.  ... 
doi:10.12777/ijse.4.2.2013.44-51 fatcat:s63lmyjtbrfcddethztyehfnae
« Previous Showing results 1 — 15 out of 352 results