Secure storage—Confidentiality and authentication

نویسندگان

چکیده

Secure disk storage is a rich and complex topic its study challenging in theory as well practice. In case of loss or theft mobile devices (such laptops smartphones), the threat data exposure important natural security objective to guarantee confidentiality data-at-rest stored such (e.g. on disks solid-state drives). Classical approaches encrypt may have severe impact performance if underlying architectural specificities are not considered. particular, it usually assumed that an encryption scheme suitable for application must be length preserving. This so-called “full encryption” method provides but does provide cryptographic integrity protection. It indeed rules out use authenticated where authentication tag concatenated ciphertext. Moreover, requires storing tags, latency added due extra read/write accesses computations. We present comprehensive full solutions compare their features from perspective. additionally models systematized analysis techniques usable these settings (which has, up now, received little attention research community). finally review current state-of-the-art incremental cryptography new insights secure contexts.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Practical and Secure Message Authentication

Use of encryption algorithms in message authentication is replaced by secure hash functions which are often faster than encryption algorithms. Tsudik 14] has proposed three methods on message authentication which are only based on one-way hash functions and use some keys to make them secure. In this paper, we give a set of practical methods, each of which uses a fast collision free hash functio...

متن کامل

Unconditionally Secure Entity Authentication

This paper studies the entity-authentication problem in an information theoretic framework, where adversaries are innnitely powerful. We rst derive lower bounds on the cheating probability and the size of keys. Next, we show an unconditionally secure and optimum entity-authentication scheme that meets all our bounds.

متن کامل

Secure Multiround Authentication Protocols

Gemmell and Naor proposed a new protocol for unconditionally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable construction which has a key size close to the fundamental lower bou...

متن کامل

Secure Sessionbased Authentication Schemes

Authentication is a process of verifying the identity of someone (a user, device, or an entity) who wants to access data, resources, or applications. Validating the identity shall establish a trust relationship for further interactions. Authentication even enables the accountability by making it possible to integrate both access and actions to specific identities. There are a huge number of tec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Science Review

سال: 2022

ISSN: ['1876-7745', '1574-0137']

DOI: https://doi.org/10.1016/j.cosrev.2022.100465