Efficient authentication for mobile and prevasive computing

dc.contributor.authorTamboli, Mujib
dc.contributor.authorSayyed, Mohammed Novman Irfan (19DET18)
dc.contributor.authorShaikh, Adnan Farook (19DET19)
dc.contributor.authorShaikh, Asif Ahsan (19DET20)
dc.date.accessioned2022-06-17T10:54:15Z
dc.date.available2022-06-17T10:54:15Z
dc.date.issued2022-05
dc.description.abstractMessage authentication is typically achieved by using message authentication codes (MACs) authenticated encryption or digital signatures. The message authentication code, also known as digital authenticator, is used as an integrity check based on a secret key shared by two parties to authenticate information transmitted betenthem. It is based on using a cryptographic hash or symmetric encryption algorithm. The authentication key is only shared by at least two parties or two communicating devices but it will fail in the existence of a third party since the algorithm will no longer be effective in detecting forgeries. In addition, the key must also be randomly generated to avoid its recovery through brute force searches and related key attacks designed to identify it from the messages transiting the medium. Securing the user message by providing authentication and security if the authenticated message must also be encrypted. With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/3893
dc.language.isoenen_US
dc.publisherAIKTCen_US
dc.subjectProject Report - EXTCen_US
dc.titleEfficient authentication for mobile and prevasive computingen_US
dc.typeProject Reporten_US
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
19DET18.pdf
Size:
1.67 MB
Format:
Adobe Portable Document Format
Description:
Black Book
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: