نتایج جستجو برای: hmac
تعداد نتایج: 237 فیلتر نتایج به سال:
Studies were conducted on vehicular ad-hoc network (VANET) in recent years. VANET is a network that combines on-board wireless equipment (On-Board Unit, OBU) and roadside fixed wireless equipment (Road Side Unit, RSU) through wireless communication technology. When vehicles broadcast messages, the traditional systems usually use RSU to do message authentication that we can ensure messages are i...
Differential Power Analysis (DPA) has turned out to be an efficient method to attack the implementations of cryptographic algorithms and has been well studied for ciphers that incorporate a nonlinear substitution box as e.g. in DES. Other product ciphers and message authentication codes are based on the mixing of different algebraic groups and do not use look-up tables. Among these are IDEA, th...
Wireless Sensor Networks (WSNs) are wireless networks consisting of a group of small, inexpensive nodes, which collect and disseminate significant data. Nodes in a wireless Sensor Networks have various energy and computational constraints due to their inexpensive, random method of deployment. Wireless Sensor Networks are utilized in a wide range of applications including battlefield surveillanc...
The IP security protocol (IPSec) is an important and widely used security protocol in the IP layer. But the implementation of the IPSec is a computing intensive work which greatly limits the performance of the high speed network. In this paper, a high performance IPSec accelerator used in a 10Gbps in-line network security processor (NSP) is presented. The design integrates the protocol processi...
We define a new black-box property for cryptographic hash function families H : {0, 1}×{0, 1}∗ → {0, 1} which guarantees that for a randomly chosen hash function HK from the family, everything “non-trivial” we are able to compute having access to the key K, we can compute only with oracle access to HK . If a hash function family is pseudo-random and has the black-box property then a randomly ch...
The security in VANETs is improvised with the involvement of Public Key Infrastructure (PKI) and Certificate Revocation List (CRL) through message authentication and the data transmissions are improved through NLOS. The direct communications between vehicles are blocked with interference of obstacles like trucks, buildings. These problems are overcome through NLOS conditions such as location ve...
In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms ...
In information security, message authentication is an essential technique to verify that received messages come from the alleged source and have not been altered. A key element of authentication schemes is the use of a message authentication code (MAC). One technique to produce a MAC is based on using a hash function and is referred to as an HMAC. Message Digest 5 (MD5) is one of the algorithms...
This article discusses the provable security of an iterated hash function using a block cipher. It assumes the construction using the Matyas-Meyer-Oseas (MMO) scheme for the compression function and the Merkle-Damg̊ard with a permutation (MDP) for the domain extension transform. It is shown that this kind of hash function, MDPMMO, is indifferentiable from the variable-input-length random oracle ...
NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and widely deployed message authentication code (MAC). Security proofs and attacks for NMAC can typically be lifted to HMAC. NMAC was introduced by Bellare, Canetti and Krawczyk [Crypto’96], who proved it t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید