Encrypted Message Authentication by Firewalls

نویسندگان

  • Chandana Gamage
  • Jussipekka Leiwo
  • Yuliang Zheng
چکیده

Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into protocol messages. The major obstacle for efficient verification of authenticity of messages at application layer is the difficulty of verifying digital signatures without disclosure of content protected by encryption. This is due to a traditional paradigm of generating a digital signature of a message and then encrypting the signature together with the message to preserve confidentiality, integrity, non-repudiation and authenticity. To overcome this limitation, a scheme shall be proposed for enabling signature verification without disclosing the content of messages. To provide maximum efficiency, the scheme is based on digital signcryption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

EHE: nonce misuse-resistant message authentication

We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The resulting polynomial hash value is encrypted again and becomes an authentication tag. We prove the prf-security of the EHE scheme and extend it to two authenticated encryption modes which follow the...

متن کامل

A Combined Method for Confidentiality, Integrity, Availability and Authentication (CMCIAA)

--This paper introduces a single method that ensures the Confidentiality, Integrity, Availability and Authentication of the message to be transmitted. Message is encrypted by the latest symmetric encryption standard called AES (Advanced Encryption Standard). A new method for calculating MAC (Message Authentication Code) based on the shared secret key used in AES, is proposed that proves the mes...

متن کامل

Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations

Biometric authentication methods are gaining popularity due to their convenience. For an authentication without relying on trusted hardwares, biometrics or their hashed values should be stored in the server. Storing biometrics in the clear or in an encrypted form, however, raises a grave concern about biometric theft through hacking or man-in-the middle attack. Unlike ID and password, once lost...

متن کامل

False Data Detection Using MAC pairs in Wireless Sensor Networks

Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. False data can be injected by compromised sensor nodes in various ways, including data aggregation and relaying. Data confidentiality...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999