Design of a Cryptographic Tamper Detection Scheme for Network Security

被引:0
|
作者
Rao, B. Srinivasa [1 ]
Prasad, S. D. V. [1 ]
机构
[1] Malla Reddy Engn Coll, Dept Comp Sci & Engn, Hyderabad 500014, Andhra Pradesh, India
关键词
Network security; Tampering; Hash Function; Encryption and Decryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the present research work an attempt has been made to design and implement a tamper detection scheme that provides an additional procedure which detects tampering, given two signatures, whether one of them was generated by the forger. In this system, emails and files are signed digitally. The scheme automatically computes a hash based on the exact content of the email message, and then encrypts the value with the sender's private key. The recipient of the email will use their tamper evidence software to compute the same calculation. The matching of the calculation with the hash value is a proof that the message has not been altered. It ensures the data integrity, confidentiality and authentication.
引用
收藏
页码:214 / 224
页数:11
相关论文
共 50 条
  • [1] CRYPTOGRAPHIC TECHNIQUES AND NETWORK SECURITY
    AYOUB, F
    SINGH, K
    [J]. IEE PROCEEDINGS-F RADAR AND SIGNAL PROCESSING, 1984, 131 (07) : 684 - 694
  • [2] The design of a cryptographic security architecture
    Gutmann, P
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
  • [3] A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
    Mihaljevic, Miodrag J.
    [J]. ENTROPY, 2019, 21 (07)
  • [4] ON THE SECURITY OF THE MERKLE-HELLMAN CRYPTOGRAPHIC SCHEME
    SHAMIR, A
    ZIPPEL, RE
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1980, 26 (03) : 339 - 340
  • [5] An image watermarking scheme with tamper detection and recovery
    Lin, Shineng D.
    Kuo, Yuchan
    Yao, Minghua
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (6A): : 1379 - 1387
  • [6] An image watermarking scheme with tamper detection and recovery
    Lin, Shinfeng D.
    Kuo, Yu-Chan
    Huang, Yu-Hsun
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 74 - +
  • [7] Verifiable data hiding scheme with tamper detection
    Kuo, Wen-Chung
    Wang, Chun-Cheng
    Kuo, Shao-Hung
    Wuu, Lih-Chyau
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (02) : 1311 - 1321
  • [8] Research and Design of Intelligent Substation Network Security Scheme
    Chang, Liu
    Wang, Jin
    Huang, Jie
    Li, Jing
    Tian, Li
    Yu, Kaiming
    Su, Lei
    Zhou, Liang
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION ENGINEERING (ICECE 2019), 2019, : 358 - 363
  • [9] Tamper-resistant cryptographic hardware
    Fujino, Takeshi
    Kubota, Takaya
    Shiozaki, Mitsuru
    [J]. IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [10] Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate
    Wang, Shengbei
    Yuan, Weitao
    Zhang, Zhen
    Wang, Lin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (03) : 6711 - 6729