Abstract
AbstractAuthenticated Encryption is a cryptographic process of providing confidentiality and integrity protection of messages in a single pass without any support of conventional checksum, Message Authentication Code (MAC), or hash function. In this paper, at first, we show that how to construct the stream‐cipher‐based Authenticated Encryption environment, where the key‐stream is generated from any secure block algorithm like Advanced Encryption Standard. In order to do that, we introduce two stream‐cipher modes of Authenticated Encryption, namely, PFC‐CTR (Counter‐based Authenticated Encryption environment) and PFC‐OCB (OCB‐based Authenticated Encryption environment), which are quite robust against several active attacks, for example, message stream modification attacks, known‐plain‐text attacks, and chosen‐plain‐text attacks, and at the same time, they can also efficiently deal with some other issues like “limited error propagation” existing in several conventional stream‐cipher modes of operation like Cipher Feedback, Output Feedback, and Counter. Finally, we enforce the concept of Authenticated Encryption in the sense of data communication security of the wireless sensor network (WSN), Global Mobility Networks (GLOMONET), and Cloud Computing environment, where only encryption can guarantee both the privacy and integrity in a single pass with the assurance of reasonable computational overhead. Copyright © 2015 John Wiley & Sons, Ltd.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.