![](images/graphics/blank.gif)
Message authentication
-
In this paper, we propose a geographically lightweight secure routing protocol (LS-TPGF) in a wireless multimedia sensor network (WMSN) using Cyclic Redundancy Check (CRC) and Elliptic Curve Cryptography (ECC) for node and message authentication.
10p
vithomson
02-07-2024
0
0
Download
-
The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
11p
visergeyne
18-06-2024
3
0
Download
-
The paper proposes a method for constructing block cipher schemes that enable verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.
12p
visergeyne
18-06-2024
1
0
Download
-
Ebook "Cryptography and security services: Mechanisms and applications" presents the following content: Chapter 1 introduction, chapter 2 ASN.1 encoding, chapter 3 random number generation, chapter 4 advanced encryption standard, chapter 5 hash functions, chapter 6 message - authentication code algorithms, chapter 7 encrypt and authenticate modes, chapter 8 large integer arithmetic, chapter 9 public key algorithms.
446p
zizaybay1103
29-05-2024
4
2
Download
-
Ebook "Foundations of cryptography - A primer" presents the following content: Chapter 1 introduction and preliminaries, chapter 2 computational difficulty and one-way functions, chapter 3 pseudorandomness, chapter 4 zero-knowledge, chapter 5 encryption schemes, chapter 6 signature and message authentication schemes, chapter 7 general cryptographic protocols.
131p
zizaybay1103
29-05-2024
2
2
Download
-
Lecture Network programming - Chapter 6: Application protocol design. This lesson provides students with content about: protocol; POP session; FTP authentication; message format; data format of messages; UML protocol state machine diagram; design presentation;... Please refer to the detailed content of the lecture!
20p
codabach1016
03-05-2024
1
0
Download
-
Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.
221p
longtimenosee08
31-03-2024
5
1
Download
-
The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
20p
vigojek
02-02-2024
2
0
Download
-
This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.
8p
vimarillynhewson
02-01-2024
6
3
Download
-
Ebook CompTIA Security+: Study guide & practice exam (2nd ed) - Part 1 Chapter 1 general security concepts: access control, authentication, and auditing; chapter 2 general security concepts: attacks; chapter 3 communication security: remote access and messaging; chapter 4 communication security: wireless; chapter 5 communication security: web based services.
380p
haojiubujain06
05-09-2023
7
2
Download
-
Ebook Implementing email security and tokens: Current standards, tools, and practices includes contents: Chapter 1 Introduction; Chapter 2 Understanding email; Chapter 3 Security fundamentals; Chapter 4 Cryptography primer; Chapter 5 Understanding public key infrastructure; Chapter 6 Protecting email message contents; Chapter 7 Protecting email passwords, headers, and commands; Chapter 8 Tokens and hardware security modules; Chapter 9 Signatures and authentication for everyone; Chapter 10 Department of defense public key infrastructure, medium grade service, and common access card; Chapter ...
314p
haojiubujain06
05-09-2023
5
3
Download
-
The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.
10p
viengels
25-08-2023
6
4
Download
-
The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.
8p
visirius
19-01-2023
7
2
Download
-
Advanced Computer Networks: Lecture 40. This lecture will cover the following: security; encryption algorithms; cryptography functions; taxonomy of network security; secret key encryption; public key authentication; authentication protocols; message integrity protocols; key distribution; firewalls;...
31p
haoasakura
30-05-2022
25
4
Download
-
Advanced Computer Networks: Lecture 41. This lecture will cover the following: message integrity protocols; digital signature using RSA; session key communication; key distribution center; man-in-the-middle attack in Diffie-Hellman; tree-structured CA hierarchy; PGP message integrity and authentication;...
31p
haoasakura
30-05-2022
17
3
Download
-
In ordinary signature schemes, such as RSA, DSA, ECDSA, the signing process is performed only for a single message. Due to performance issues, in some contexts, the above solutions will become unsuitable if a party needs to sign multiple messages simultaneously. For example, in the authenticated key exchange protocols based on signatures between client and server, the server is expected to handle multiple key exchange requests from different clients simultaneously.
12p
vikissinger
03-03-2022
16
1
Download
-
Lecture Cryptography and network security: Chapter 11 after studying this section will help you understand: To define message integrity; To define message authentication; To define criteria for a cryptographic hash function; To define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions;...
41p
hoathachthao090
10-02-2022
16
4
Download
-
Lecture Cryptography and network security: Chapter 13 after studying this section will help you understand: To define a digital signature; To define security services provided by a digital signature; To define attacks on digital signatures; To discuss some digital signature schemes, including RSA, ElGamal;...
36p
hoathachthao090
10-02-2022
13
4
Download
-
The following will be discussed in this unit: Importance of responsible marketing and communications in tourism; communicating authentic and accurate messages; marketing and communicating sustainable practices; maintaining data privacy in marketing; collecting visitor feedback.
62p
cucngoainhan5
08-12-2021
11
2
Download
-
Bài giảng An toàn hệ thống thông tin: Chương 3b Mã xác thực thông điệp cung cấp cho người học những kiến thức như: Khái niệm toàn vẹn và xác thực thông điệp; MAC (Message Authentication Code); Thảo luận vài cơ chế MAC. Mời các bạn cùng tham khảo!
13p
caphesuadathemchanh
25-10-2021
41
5
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)