Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network

被引:7
|
作者
Hwang, Tzonelih [1 ]
Gope, Prosanta [1 ]
机构
[1] Natl Cheng Kung Univ, Tainan 701, Taiwan
关键词
privacy; integrity; Authenticated Encryption; GLOMONET; authenticated cloud service;
D O I
10.1002/sec.1388
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated Encryption is a cryptographic process of providing confidentiality and integrity protection of messages in a single pass without any support of conventional checksum, Message Authentication Code (MAC), or hash function. In this paper, at first, we show that how to construct the stream-cipher-based Authenticated Encryption environment, where the key-stream is generated from any secure block algorithm like Advanced Encryption Standard. In order to do that, we introduce two stream-cipher modes of Authenticated Encryption, namely, PFC-CTR (Counter-based Authenticated Encryption environment) and PFC-OCB (OCB-based Authenticated Encryption environment), which are quite robust against several active attacks, for example, message stream modification attacks, known-plain-text attacks, and chosen-plain-text attacks, and at the same time, they can also efficiently deal with some other issues like limited error propagation existing in several conventional stream-cipher modes of operation like Cipher Feedback, Output Feedback, and Counter. Finally, we enforce the concept of Authenticated Encryption in the sense of data communication security of the wireless sensor network (WSN), Global Mobility Networks (GLOMONET), and Cloud Computing environment, where only encryption can guarantee both the privacy and integrity in a single pass with the assurance of reasonable computational overhead. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:667 / 679
页数:13
相关论文
共 50 条
  • [1] Robust Chaos-based Stream-Cipher for Secure Public Communication Channels
    Jallouli, Ons
    El Assad, Safwan
    Chetto, Maryline
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 23 - 26
  • [2] An Efficient Authenticated-Encryption with Associated-Data Block Cipher Mode for Wireless Sensor Networks
    Adekunle, A. A.
    Woodhead, S. R.
    [J]. WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 375 - 385
  • [3] Secure Encryption in Wireless Sensor Network
    Jia Chenjun
    Liao Yongjian
    Chen Kangshen
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3621 - +
  • [4] Secure and Authenticated Data Communication in Wireless Sensor Networks
    Alfandi, Omar
    Bochem, Arne
    Kellner, Ansgar
    Goege, Christian
    Hogrefe, Dieter
    [J]. SENSORS, 2015, 15 (08) : 19560 - 19582
  • [5] Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    [J]. CRYPTOGRAPHY, 2018, 2 (01) : 1 - 18
  • [6] An Implementation of Caesar Cipher and XOR Encryption Technique in a Secure Wireless Communication
    Han, Lim Chong
    Mahyuddin, Nor Muzlifah
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2014, : 111 - 116
  • [7] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
    Salam, Md Iftekhar
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 15 - 26
  • [8] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Wong, Kenneth Koon-Ho
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 961 - 966
  • [9] Design and Simulation of Authenticated Encryption AENOTP Stream Cipher Algorithm
    Hussein, Mohamed Nabil
    Megahed, Mohamed Helmy
    Azeem, Mohamed Hassan Abdel
    [J]. 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 393 - 398
  • [10] A new secure stream cipher for scan chain encryption
    Da Silva, Mathieu
    Valea, Emanuele
    Flottes, Marie-Lise
    Dupuis, Sophie
    Di Natale, Giorgio
    Rouzeyre, Bruno
    [J]. 2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 68 - 73