首页> 外文期刊>Security and Communications Networks >Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network
【24h】

Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network

机译:认证加密的鲁棒流密码模式,用于无线传感器网络中的安全通信

获取原文
获取原文并翻译 | 示例
           

摘要

Authenticated Encryption is a cryptographic process of providing confidentiality and integrity protection of messages in a single pass without any support of conventional checksum, Message Authentication Code (MAC), or hash function. In this paper, at first, we show that how to construct the stream-cipher-based Authenticated Encryption environment, where the key-stream is generated from any secure block algorithm like Advanced Encryption Standard. In order to do that, we introduce two stream-cipher modes of Authenticated Encryption, namely, PFC-CTR (Counter-based Authenticated Encryption environment) and PFC-OCB (OCB-based Authenticated Encryption environment), which are quite robust against several active attacks, for example, message stream modification attacks, known-plain-text attacks, and chosen-plain-text attacks, and at the same time, they can also efficiently deal with some other issues like limited error propagation existing in several conventional stream-cipher modes of operation like Cipher Feedback, Output Feedback, and Counter. Finally, we enforce the concept of Authenticated Encryption in the sense of data communication security of the wireless sensor network (WSN), Global Mobility Networks (GLOMONET), and Cloud Computing environment, where only encryption can guarantee both the privacy and integrity in a single pass with the assurance of reasonable computational overhead. Copyright (c) 2015 John Wiley & Sons, Ltd.
机译:Authenticated Encryption是一种加密过程,可在一次传递中为消息提供机密性和完整性保护,而无需任何常规校验和,消息验证码(MAC)或哈希功能的支持。在本文中,首先,我们展示了如何构建基于流密码的身份验证加密环境,在该环境中,密钥流是从任何安全块算法(如高级加密标准)生成的。为此,我们引入了两种身份验证加密流密码模式,即PFC-CTR(基于计数器的身份验证加密环境)和PFC-OCB(基于OCB的身份验证加密环境),它们对于几种活动模式非常健壮攻击,例如消息流修改攻击,已知明文攻击和选择明文攻击,同时,它们还可以有效地处理一些其他问题,例如几种常规流中存在的有限错误传播。密码操作,密码反馈,计数器等加密操作模式。最后,我们从无线传感器网络(WSN),全球移动网络(GLOMONET)和云计算环境的数据通信安全性的角度出发,实施身份验证加密的概念,其中只有加密才能在单个环境中保证隐私和完整性。通过合理的计算开销的保证。版权所有(c)2015 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号