Protecting integrity and confidentiality for data communication

被引:0
|
作者
Hou, FY [1 ]
Wang, ZY [1 ]
Tang, YH [1 ]
Liu, Z [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a scheme to build data communication system that can effectively protect data integrity and confidentiality. Firstly, this paper briefly introduces the situation of integrity and confidentiality protection. Then, this paper brings forward a new cipher, which uses a keystream generator to produce infinite number of frame secret keys basing on an infinite root key space, and use a unique one-off frame secret key for each data encryption/deciyption. Basing on this cipher, we construct a data communication system. This paper illustrates how to build such a system and analyze its protections of data integrity and confidentiality. With the character of cipher, it offers high resistance against cryptanalysis to prevent data disclosure, and it gives little opportunities to those intractable attacks that can compromise data integrity.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [21] Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks
    Bista, Rabindra
    Kim, Yong-Ki
    Song, Myoung-Seon
    Chang, Jae-Woo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 67 - 77
  • [22] Balancing confidentiality: Protecting privacy and protecting the public
    Donner, Michael B.
    VandeCreek, Leon
    Gonsiorek, John C.
    Fisher, Celia B.
    [J]. PROFESSIONAL PSYCHOLOGY-RESEARCH AND PRACTICE, 2008, 39 (03) : 369 - 372
  • [23] Protecting Train Balise Telegram Data Integrity
    Guo, Huaqun
    Sim, Jonathan Zhi Wei
    Veeravalli, Bharadwaj
    Lu, Jiqiang
    [J]. 2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2018, : 806 - 811
  • [24] Confidentiality and integrity for data aggregation in WSN using peer monitoring
    Di Pietro, Roberto
    Michiardi, Pietro
    Molva, Refik
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 181 - 194
  • [25] CONFIDENTIALITY AND PERSONAL INTEGRITY
    EDGAR, A
    [J]. NURSING ETHICS, 1994, 1 (02) : 86 - 95
  • [26] Integrity coded databases- protecting data integrity for outsourced databases
    Yeh, Jyh-haw
    Arifin, Md Mashrur
    Shen, Ning
    Karki, Ujwal
    Xie, Yi
    Nanjundarao, Archana
    [J]. COMPUTERS & SECURITY, 2024, 136
  • [27] POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
    Kohlbrenner, Anne
    Araujo, Frederico
    Taylor, Teryl
    Stoecklin, Marc Ph.
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2523 - 2525
  • [28] Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage
    Srivastav, Niharika
    Mathew, Rejo
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 522 - 528
  • [29] Maintaining confidentiality of interim data to enhance trial integrity and credibility
    Fleming, Thomas R.
    Sharples, Katrina
    McCall, John
    Moore, Andrew
    Rodgers, Anthony
    Stewart, Ralph
    [J]. CLINICAL TRIALS, 2008, 5 (02) : 157 - 167
  • [30] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Ben Othman, Soufiene
    Bahattab, Abdullah Ali
    Trad, Abdelbasset
    Youssef, Habib
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) : 867 - 889