A New Technique For Authenticating Short Encrypted Messages
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
The best MACs in the cryptographic narrative are based on universal hashing. The major cause following the presentation benefit of worldwide hashing-based MACs is the fact that dispensation messages block by block by universal hash functions is orders of scale faster than dispensation them block by block using block ciphers or cryptographic hash functions. One of the major dissimilarity among unconditionally secure MACs based on universal hashing and computationally secure MACs based on universal hashing is the obligation to course the solid image with a cryptographic prehistoric in the latter class of MACs. The heavy cause behind our search is that by a common purpose MAC algorithm to validate replace messages in such systems might not be the as a rule resourceful solution and can direct to misuse of resources by now existing, that is, the refuge that is supply by the encryption algorithm.
Authors and Affiliations
M. Vamsi Krishna| HOD & Professor, 2.Professor &Guide, 3.Final Year MTech Student, Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India, V. G. L. Narasamba| Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India, N. Veeramani| Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India
ESAD: An Efficient Secure Authorized Data Deduplication On Hybrid Cloud Storage Architecture
Deduplication is capable at moreover the file level or the block level which do left with duplicate obstruct of data that take place in non-identical files. Data deduplication is a paying attention data firmness syste...
A New Efficient Approach for Melioration of Power Quality in Grid Interfacing with PV/Battery Hybrid System
This paper proposes grid integration of solar (PV)/Battery hybrid energy conversion system with (i) multi-functional features of micro grid-side bidirectional voltage source converter (μG-VSC) (ii) tight voltage reg...
Distributed File System Supporting Parallel Access To Multiple Storage Devices
Our audit of the current Kerberos-based protocol demonstrates that it has various impediments: (i) a metadata server encouraging key trade between the customers and the storage devices has substantial workload that l...
AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks
Far reaching scale sensor frameworks are sent in different application spaces, and the data they accumulate are used as a piece of essential initiative for fundamental structures. Data are spilled from different sour...
Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements
The controlled induction motor drives without mechanical speed sensors at the motor shaft have the attractions of low cost and high reliability. To replace the sensor, the information on the rotor speed is extracted...