Secure AODV using Symmetric Key Cryptography with Cyclic Chain Hash Function (CCHF)
نویسندگان
چکیده
منابع مشابه
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
Recent results of Kaplan et al., building on previous work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems are completely broken when exposed to quantum CPA attacks. In such an attack, the quantum adversary has the ability to query the cryptographic functionality in superposition. The vulnerable cryptosystems include the Even-Mansour block...
متن کاملA Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography
Secure communication is an important issue in networks and user authentication is a very important part of the security. Several strong-password authentication protocols have been introduced, but there is no fully secure authentication scheme that can resist all known attacks. We propose enhanced secure schemes with registration and login protocols, and add the “forget password” and password/ve...
متن کاملSecrecy Group Creation with Symmetric-Key Cryptography
We lift Cardelli, Ghelli and Gordon’s secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extension of the associated type system. We then formulate a notion of secrecy preservation in the presence of cryptography, and prove that well-typed processes in the extended type system preserve secrecy of declared secrets, ev...
متن کاملA Secure Chameleon Hash Function without Key Exposure from Pairings
Chameleon signatures are based on well established hash-and-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest, and becomes an important building block. The chameleon hash function is a trapdoor one-way hash function with some special properties, and plays an important role in constructing chameleon signature. In the paper, we propose a new chamel...
متن کاملStrenthening Hash Functions using Block Symmetric Key Encryption Algorithm
With the requirement of high speed network protocols, fast message integrity and authentication services are at the top most priority. Currently many integrity techniques, that involve hashing, are being used and developed, but almost every technique faces one or other attack or any other security or performance related issue. The chief problem being faced is the forgery of hash value, being tr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/7290-0445