Better Authentication Methods For Mobile Computing
Journal: GRD Journal for Engineering (Vol.1, No. 6)Publication Date: 2016-06-01
Authors : Amit Waghmare; Avinash Ingole; Onkar Salaskar;
Page : 33-35
Keywords : Authentication; unconditional security; computational security; universal hash-function families; pervasive computing.;
Abstract
Today’s many application rely on small devices that can interact with each other through communication network. In this project we are proposing two new methods for authenticating encrypted message that are directed to assemble the requirements of mobile application. In this applications, the integrity and confidentiality of communicated messages are required. To getting benefit of that fact that the messages to be authenticated must also be encrypted, we propose provably methods for safe authentication codes that are more efficient than any message authentication code. The key idea behind the proposed techniques is to exert the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using single authentication primitives.
Other Latest Articles
Last modified: 2016-05-15 18:00:43