2020
DOI: 10.12928/telkomnika.v18i5.15276
|View full text |Cite
|
Sign up to set email alerts
|

A new algorithm for implementing message authentication and integrity in software implementations

Abstract: IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software applications are re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…In summary, the PCNN is an artificial model that can be counted with other artificial intelligence (AI) models as in [26][27][28][29][30][31][32][33]. It can be exploited for important security issues such as [34][35][36][37][38][39][40][41]. Appropriate parameters of PCNN have been evaluated as will be illustrated in the next section.…”
Section: Methodsmentioning
confidence: 99%
“…In summary, the PCNN is an artificial model that can be counted with other artificial intelligence (AI) models as in [26][27][28][29][30][31][32][33]. It can be exploited for important security issues such as [34][35][36][37][38][39][40][41]. Appropriate parameters of PCNN have been evaluated as will be illustrated in the next section.…”
Section: Methodsmentioning
confidence: 99%
“…A hash function converts binary sequences of arbitrary length, called messages, into binary strings of a specific length [1], called message digests or hash values [2], [3]. Hash functions are mainly used for the confirmation of data integrity [4] as well as for message authentication codes (MAC) [5] or hash message authentication code (HMAC) [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…Protection is a primary concern for digital connections every day [5]. Encryption can protect data transformation and data authentication storage [6].…”
Section: Introductionmentioning
confidence: 99%