A New Technique For Authenticating Short Encrypted Messages

Abstract

The best MACs in the cryptographic narrative are based on universal hashing. The major cause following the presentation benefit of worldwide hashing-based MACs is the fact that dispensation messages block by block by universal hash functions is orders of scale faster than dispensation them block by block using block ciphers or cryptographic hash functions. One of the major dissimilarity among unconditionally secure MACs based on universal hashing and computationally secure MACs based on universal hashing is the obligation to course the solid image with a cryptographic prehistoric in the latter class of MACs. The heavy cause behind our search is that by a common purpose MAC algorithm to validate replace messages in such systems might not be the as a rule resourceful solution and can direct to misuse of resources by now existing, that is, the refuge that is supply by the encryption algorithm.

Authors and Affiliations

M. Vamsi Krishna| HOD & Professor, 2.Professor &Guide, 3.Final Year MTech Student, Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India, V. G. L. Narasamba| Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India, N. Veeramani| Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India

Keywords

Related Articles

Solutions To Plate Problem With Constant Rigidity Using Singularity Functions

A new and novel method of solving problems of rectangular plates of constant stiffness using singularity functions is proposed. The working methods and manifestations of the use of singularity functions in plate analysis...

Finest Informant Filtering of Malicious Traffic in Intrusion Detection System

Traffic volume and diversity will have a major impact on the power of network intrusion detection systems (NIDS) to report malicious activity accurately. Supported the observation that a good deal of traffic is, in f...

An Suitable Minimum Utility Threshold By Trial And Error Is A Tedious Process For Users

We address the above issues by proposing another system for top-k high utility itemset mining, where k is the coveted number of HUIs to be mined. Two sorts of effective calculations named TKU (mining Top-K Utility it...

Performance and Analysis Of Modern Soot Blower By Improving Boiler Efficiency Of A Thermal Power Plant

In Thermal power plants for better performance and maximum efficiency the best suitable method is Energy Audit, which plays a key role in any industry or organization. Every problem has a solution; we have so many wa...

Thermal Analysis Of A Gas Turbine Rotor Blade

A turbine rotor blade is the individual component which makes up the turbine section of a gas turbine. The blades are responsible for extracting energy from the high temperature, high pressure gas produced by the com...

Download PDF file
  • EP ID EP16577
  • DOI -
  • Views 368
  • Downloads 23

How To Cite

M. Vamsi Krishna, V. G. L. Narasamba, N. Veeramani (2015). A New Technique For Authenticating Short Encrypted Messages. International Journal of Science Engineering and Advance Technology, 3(10), 617-621. https://www.europub.co.uk/articles/-A-16577