Abstract

This research concerns with proposing a method of combining the encryption and authentication in text files, So the research depended Symmetric encryption methods, transpositions methods, and substitution methods to provide text files security. To provide authentication, a new method for calculating Hash functions was suggested to produce a message digest. The goal of this work is to detect any intrusion activities which includes disclosure, insertion, deletion, and rearranging of the text file while sending through computer's networks.

Highlights

  • Verifying the integrity and authenticity of information is a prime necessity in computer systems and networks

  • [20]College of Adminstration and Economics Tanmyat AL-Rafidain 87(29) 2007 information sent by one party can be validated as authentic by the other [Bellare M. ,1998]

  • Message Authentication, often called Message Integrity, provides assurance to the recipient of the data that it came from the expected sender and has not been altered in transit

Read more

Summary

Introduction

Verifying the integrity and authenticity of information is a prime necessity in computer systems and networks. To reduce the communication costs and computational complexity, Hwang et al [S.J. Hwang, 1996] proposed an authenticated encryption scheme with message linkages based on that of Horster et al.‘s scheme. In 2002, Tseng and Jan [Y.M. Tseng ,2002] proposed an efficient authenticated encryption scheme with message linkages and low communication costs based on Horster et al‘s scheme. Tseng ,2002] proposed an efficient authenticated encryption scheme with message linkages and low communication costs based on Horster et al‘s scheme Their proposed method has lower communication costs and less computational complexity than those methods mentioned above. The proposed method can achieve message authentication and security efficiently, and an intruder won't have the chance to forge to be other's signature to send out the information

Terminology and Definitions
Authentication
Hash Function
One-way Hash Function
The Proposed Method
Encryption Algorithm
A Proposed Method of Combining Text Files
Diffusion
Confusion
Conclusions and Discussions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call