Protecting integrity and confidentiality for data communication

被引:0
|
作者
Hou, FY [1 ]
Wang, ZY [1 ]
Tang, YH [1 ]
Liu, Z [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a scheme to build data communication system that can effectively protect data integrity and confidentiality. Firstly, this paper briefly introduces the situation of integrity and confidentiality protection. Then, this paper brings forward a new cipher, which uses a keystream generator to produce infinite number of frame secret keys basing on an infinite root key space, and use a unique one-off frame secret key for each data encryption/deciyption. Basing on this cipher, we construct a data communication system. This paper illustrates how to build such a system and analyze its protections of data integrity and confidentiality. With the character of cipher, it offers high resistance against cryptanalysis to prevent data disclosure, and it gives little opportunities to those intractable attacks that can compromise data integrity.
引用
收藏
页码:357 / 362
页数:6
相关论文
共 50 条
  • [41] Ensuring Confidentiality and Integrity of Multimedia Data on Multi-core Platforms
    Lee, Eunji
    Lee, Sungju
    Chung, Yongwha
    Cho, Hyeonjoong
    Pan, Sung Bum
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT 2, PROCEEDINGS, 2010, 6082 : 42 - +
  • [42] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques
    Hambouz, Ahmed
    Shaheen, Yousef
    Manna, Abdelrahman
    Al-Fayoumi, Mustafa
    Tedmori, Sara
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
  • [43] Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment
    Rajkumar, V
    Prakash, M.
    Vennila, V.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 779 - 793
  • [44] Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images
    Al-Haj, Ali
    [J]. JOURNAL OF DIGITAL IMAGING, 2015, 28 (02) : 179 - 187
  • [45] A Technique to Resolve Data Integrity and Confidentiality Issues in a Wireless Sensor Network
    Kumar, Sunil
    Krishna, C. Rama
    Solanki, A. K.
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 183 - 188
  • [46] Regulatory perspectives on data safety monitoring boards - Protecting the integrity of data
    Hemmings, R
    Day, S
    [J]. DRUG SAFETY, 2004, 27 (01) : 1 - 6
  • [47] Data Confidentiality and Integrity Verification using User Authenticator scheme in cloud
    Nirmala, V.
    Sivanandhan, R. K.
    Lakshmi, R. Shanmuga
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC), 2013,
  • [48] A machine learning framework for providing data integrity and confidentiality for sensitive data cloud applications
    Narayanan, Eswara
    Muthukumar, B.
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [49] Providing Integrity, Authenticity, and Confidentiality for Header and Pixel Data of DICOM Images
    Ali Al-Haj
    [J]. Journal of Digital Imaging, 2015, 28 : 179 - 187
  • [50] Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing
    Litvinov, Egor
    Llumiguano, Henry
    Santofimia, Maria J.
    del Toro, Xavier
    Villanueva, Felix J.
    Rocha, Pedro
    [J]. SENSORS, 2023, 23 (10)