Abstract
This research concerns with proposing a method of combining the encryption and authentication in text files, So the research depended Symmetric encryption methods, transpositions methods, and substitution methods to provide text files security. To provide authentication, a new method for calculating Hash functions was suggested to produce a message digest. The goal of this work is to detect any intrusion activities which includes disclosure, insertion, deletion, and rearranging of the text file while sending through computer's networks.
Highlights
Verifying the integrity and authenticity of information is a prime necessity in computer systems and networks
[20]College of Adminstration and Economics Tanmyat AL-Rafidain 87(29) 2007 information sent by one party can be validated as authentic by the other [Bellare M. ,1998]
Message Authentication, often called Message Integrity, provides assurance to the recipient of the data that it came from the expected sender and has not been altered in transit
Summary
Verifying the integrity and authenticity of information is a prime necessity in computer systems and networks. To reduce the communication costs and computational complexity, Hwang et al [S.J. Hwang, 1996] proposed an authenticated encryption scheme with message linkages based on that of Horster et al.‘s scheme. In 2002, Tseng and Jan [Y.M. Tseng ,2002] proposed an efficient authenticated encryption scheme with message linkages and low communication costs based on Horster et al‘s scheme. Tseng ,2002] proposed an efficient authenticated encryption scheme with message linkages and low communication costs based on Horster et al‘s scheme Their proposed method has lower communication costs and less computational complexity than those methods mentioned above. The proposed method can achieve message authentication and security efficiently, and an intruder won't have the chance to forge to be other's signature to send out the information
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have