A New Technique For Authenticating Short Encrypted Messages
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
The best MACs in the cryptographic narrative are based on universal hashing. The major cause following the presentation benefit of worldwide hashing-based MACs is the fact that dispensation messages block by block by universal hash functions is orders of scale faster than dispensation them block by block using block ciphers or cryptographic hash functions. One of the major dissimilarity among unconditionally secure MACs based on universal hashing and computationally secure MACs based on universal hashing is the obligation to course the solid image with a cryptographic prehistoric in the latter class of MACs. The heavy cause behind our search is that by a common purpose MAC algorithm to validate replace messages in such systems might not be the as a rule resourceful solution and can direct to misuse of resources by now existing, that is, the refuge that is supply by the encryption algorithm.
Authors and Affiliations
M. Vamsi Krishna| HOD & Professor, 2.Professor &Guide, 3.Final Year MTech Student, Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India, V. G. L. Narasamba| Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India, N. Veeramani| Department of Computer Science and Engineering, Chaitanya Institute of Science and Technology, Madhavapatnam, Kakinada, East Godavari District, Andhara Pradesh, India
Evalauation Of Heat Transfer Characteristics Of Titanium Nitride And Titanium Carbide Nano Fluids In Shell & Tube Heat Exchanger
The Shell and tube heat exchangers signify the most widely used vehicle for the transfer of heat in industrial process and applications. Shell and tube heat exchangers have the capability to transfer huge amounts of...
Secure Cloud Email System On Privacy Protocol And Identity-Based Encryption
A flexible primitive alluded to as conditional identity-based broadcast PRE (CIBPRE) and formalizes its semantic security. CIBPRE enables a sender to encode a message to numerous collectors by indicating these benefi...
Providing Efficient Privacy Of Xml Data By Using Anonymity
Scientists mine the extensive information got from various sources having distinctive configurations like database information and XML. Protection is one of most critical component while exchanging the information to...
Performance Improvement of IUPQC in Distribution System under Abnormal Conditions Using FLC
This paper proposes a new connection for a Interline Unified Power Quality Conditioner (IUPQC) to improve the power quality of two feeders in a distribution system. An IUPQC consists of a series voltage-source conver...
Improved MCA Based DoS Attack Detection
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet...