Design of a Cryptographic Tamper Detection Scheme for Network Security

被引:0
|
作者
Rao, B. Srinivasa [1 ]
Prasad, S. D. V. [1 ]
机构
[1] Malla Reddy Engn Coll, Dept Comp Sci & Engn, Hyderabad 500014, Andhra Pradesh, India
关键词
Network security; Tampering; Hash Function; Encryption and Decryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the present research work an attempt has been made to design and implement a tamper detection scheme that provides an additional procedure which detects tampering, given two signatures, whether one of them was generated by the forger. In this system, emails and files are signed digitally. The scheme automatically computes a hash based on the exact content of the email message, and then encrypts the value with the sender's private key. The recipient of the email will use their tamper evidence software to compute the same calculation. The matching of the calculation with the hash value is a proof that the message has not been altered. It ensures the data integrity, confidentiality and authentication.
引用
收藏
页码:214 / 224
页数:11
相关论文
共 50 条
  • [41] Tamper detection and self-recovery scheme by DWT watermarking
    Benrhouma, Oussama
    Hermassi, Houcemeddine
    Belghith, Safya
    [J]. NONLINEAR DYNAMICS, 2015, 79 (03) : 1817 - 1833
  • [42] Unpredictable cryptographic primitives for the Robust Wireless Network Security
    Asimi, Younes
    Asimi, Ahmed
    Guezzaz, Azidine
    Tbatou, Zakariae
    Sadqi, Yassine
    [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 316 - 321
  • [43] An Efficient Hybrid Cryptographic Scheme for Wireless Sensor Network with Network Coding
    Liang, Man
    Kan, Haibin
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (09) : 1889 - 1894
  • [44] Design and development of network intrusion detection system detection scheme on network processing unit
    Salim, R
    Rao, GSVK
    [J]. 8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1023 - U1025
  • [45] Tamper Detection in the EPC Network Using Digital Watermarking
    Han, ShuiHua
    Chu, Chao-Hsien
    Luo, Zongwei
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 62 - 69
  • [46] The Design of Enterprise Network Information Sharing Scheme Based on Security Technology
    Ji, Jun
    Xing, Fei-Fei
    Zang, Yu-Qing
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 623 - 626
  • [47] Basing cryptographic protocols on tamper-evident seals
    Moran, T
    Naor, M
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 285 - 297
  • [48] A tamper resistant hardware accelerator for RSA cryptographic applications
    Saggese, GP
    Romano, L
    Mazzocca, N
    Mazzeo, A
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2004, 50 (12) : 711 - 727
  • [49] Basing cryptographic protocols on tamper-evident seals
    Moran, Tal
    Naor, Moni
    [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (10) : 1283 - 1310
  • [50] Adaptive tamper detection watermarking scheme for medical images in transform domain
    Sanivarapu, Prasanth Vaidya
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (08) : 11605 - 11619