2018
DOI: 10.11591/ijeecs.v12.i3.pp1297-1304
|View full text |Cite
|
Sign up to set email alerts
|

Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code

Abstract: <p>In this era of universal electronic connectivity, communication is no more confined to transfer of data from one end to the other; rather it aims at secure data transfer. Communication sector has developed beyond this traditional boundary of data transfer and is now working on ways to provide data from the intended senders to the intended receivers in an unaltered form. Considering all these conditions, the data transfer needs to follow the principles of authentication, confidentiality and integrity. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…The Equation (1) is used to determine if a polyalphabetic substitution is used or not. = 0.057971014 (4) IC between 0.0385 and 0.065, the polyalphabetic substitution used. After we used data from Table 10 and applied results on (1), we find that the polyalphabetic substitution was used in both methods.…”
Section: The Advantages Of Kaj Spiral Methods Over Original Playfair Amentioning
confidence: 99%
See 1 more Smart Citation
“…The Equation (1) is used to determine if a polyalphabetic substitution is used or not. = 0.057971014 (4) IC between 0.0385 and 0.065, the polyalphabetic substitution used. After we used data from Table 10 and applied results on (1), we find that the polyalphabetic substitution was used in both methods.…”
Section: The Advantages Of Kaj Spiral Methods Over Original Playfair Amentioning
confidence: 99%
“…The strongest and the most valuable technique used from the beginning of humanity and still developed and used until these days is cryptography with its all types such as symmetric (classic and modern), asymmetric, and hybrid. Data authentication helps in privacy preservation and is based on encryption systems [4]. When researchers develop a new algorithm and rank it as strong or weak it will be subject to study and analysis, may be this algorithm will be used or be subject for improvement.…”
Section: Introductionmentioning
confidence: 99%
“…Lately, implementing speculative instructions lead to have a bad impact on the cash and other structure even though when this instructions executing is not happening or their influence do not appear [25]. Consequently, the latest meltdown and spectre attacks take advantage of this risk to revel secret information where it's unauthorized to access [36]. To illustrate, attackers can misused these data or sabotage it by exploiting speculative execute code that read confidential information [25] [27] [28] [30] [18].…”
Section: Meltdown and Spectre Attackmentioning
confidence: 99%
“…Phishing happened by using malwares or social engineering to have private data [23]. On the other hand, Ransomware idea is to encrypt [2] [3] [36] and lock the information by using malicious then request money to return it back [20] [19].…”
Section: Introductionmentioning
confidence: 99%
“…However, recent Authentication and Key Agreement (AKA) protocols dedicated to the 3GPP for Long Term 849 Evolution (LTE) or Evolved Packet System (EPS), known as EPS-AKA or for non-3GPP access networks, known as Extensible Authentication Protocol (EAP-AKA), cannot provide sufficient security. In addition, to support M2M communications, the 3GPP mobile operator must adapt its network to a large number of MTC Devices (MTCDs), which can overload its network resources and introduce congestion into the network on both data and control plans [5]. In fact, congestion can occur due to simultaneous authentication signaling messages from M2M devices [6][7].…”
Section: Introductionmentioning
confidence: 99%