SlideShare a Scribd company logo
1 of 15
Efficient Authentication
for Mobile and
Pervasive
Computing
BASEL ALOMAIR, MEMBER, IEEE AND RADHA POOVENDRAN, SENIOR
MEMBER, IEEE
Abstract
With today’s technology, many applications rely on the existence of small
devices that can exchange information and form communication networks. In
a significant portion of such applications, the confidentiality and integrity of the
communicated messages are of particular interest. In this work, we propose
two novel techniques for authenticating short encrypted messages that are
directed to meet the requirements of mobile and pervasive applications. By
taking advantage of the fact that the message to be authenticated must also
be encrypted, we propose provably secure authentication codes that are more
efficient than any message authentication code in the literature. The key idea
behind the proposed techniques is to utilize the security that the encryption
algorithm can provide to design more efficient authentication mechanisms, as
opposed to using standalone authentication primitives.
Existing System
There are two important observations to make about existing MAC algorithms.
First, they are designed independently of any other operations required to be
performed on the message to be authenticated. For instance, if the
authenticated message must also be encrypted, existing MACs are not
designed to utilize the functionality that can be provided by the underlying
encryption algorithm. Second, most existing MACs are designed for the
general computer communication systems, independently of the properties
that messages can possess. For example, one can find that most existing
MACs are inefficient when the messages to be authenticated are short. (For
instance, UMAC, the fastest reported message authentication code in the
cryptographic literature, has undergone large algorithmic changes to increase
its speed on short messages ).
Disadvantages of proposed system
 Existing MACs are not designed to utilize the functionality that can be
provided by the underlying encryption algorithm.
 Most existing MACs are designed for the general computer communication
systems, independently of the properties that messages can possess.
Proposed System
We propose the following research question: if there is an application in which
messages that need to be exchanged are short and both their privacy and
integrity need to be preserved, can one do better than simply encrypting the
messages using an encryption algorithm and authenticating them using
standard MAC algorithm? We answer the question by proposing two new
techniques for authenticating short encrypted messages that are more
efficient than existing approaches. In the first technique, we utilize the fact
that the message to be authenticated is also encrypted, with any secure
encryption algorithm, to append a short random string to be used in the
authentication process.
Advantages of proposed system
 More security, using two concepts one is mobile computing and another
one is pervasive computing.
 The random strings used for different operations are independent, the
authentication algorithm can benefit from the simplicity of unconditional
secure authentication to allow for faster and more efficient authentication,
without the difficulty to manage one-time keys. In the second technique,
we make the extra assumption that the used encryption algorithm is block
cipher based to further improve the computational efficiency of the first
technique.
Architecture
Modules
The proposed system has the following modules:
 Authenticating Short Encrypted Messages
 Security Model
 Data Privacy
 Security of the Authenticated Encryption Composition
Module Description
 Authenticating Short Encrypted Messages
In this module, we describe our first authentication scheme that can be used
with any IND-CPA secure encryption algorithm .An important assumption we
make is that messages to be authenticated are no longer than a predefined
length. This includes applications in which messages are of fixed length that
is known a priori, such as RFID systems in which tags need to authenticate
their identifiers, sensor nodes reporting events that belong to certain domain
or measurements within a certain range, etc. The novelty of the proposed
scheme is to utilize the encryption algorithm to deliver a random string and
use it to reach the simplicity and efficiency of one-time pad authentication
without the need to manage impractically long keys.
 Security Model
A message authentication scheme consists of a signing algorithm S and a verifying algorithm V.
The signing algorithm might be probabilistic, while the verifying one is usually not. Associated
with the scheme are parameters and N describing the length of the shared key and the resulting
authentication tag, respectively. On input an `-bit key k and a message m, algorithm S outputs an
N-bit string called the authentication tag, or the MAC of m. On input an `-bit key k, a message m,
and an N-bit tag , algorithm V outputs a bit, with 1 standing for accept and 0 for reject. We ask for
a basic validity condition, namely that authentic tags are accepted with probability one.) for a
random but hidden choice of k. A can query S to generate a tag for a plaintext of its choice and
ask the verifier V to verify that _ is a valid tag for the plaintext. Formally, A’s attack on the scheme
is described by the following experiment:
1) A random string of length ` is selected as the shared secret.
2) Suppose A makes a signing query on a message m. Then the oracle computes an
authentication tag _ = S(k; m)and returns it to A. (Since S may be probabilistic, this step requires
making the necessary underlying choice of a random string for S, anew for each signing query.)
3) Suppose A makes a verify query (m; _ ). The oracle computes the decision d = V(k; m; _ ) and
returns it to A.
 Data Privacy
Recall that two pieces of information are transmitted to the intended receiver
(the cipher text and the authentication tag),both of which are functions of the
private plaintext message. Now, when it comes to the authentication tag,
observe that then once r serves as a one-time key (similar to the role r plays
in the construction of Section .
The formal analysis that the authentication tag does not compromise
message privacy is the same as the one provided . The cipher text of
equation ,on the other hand, is a standard CBC encryption and its security is
well-studied; thus, we give the theorem statement below without a formal
proof (interested readers may refer to textbooks in cryptography.
 Security of the Authenticated Encryption
Composition
In this module, it defined two notions of integrity for authenticated encryption
systems: the first is integrity of plaintext (INT-PTXT) and the second is
integrity of cipher text (INT-CTXT). Combined with encryption algorithms that
provide in-distinguish ability under chosen plaintext attacks(IND-CPA), the
security of different methods for constructing generic compositions is
analyzed. Note that our construction is an instance of the Encrypt-and-
Authenticate (E&A) generic composition since the plaintext message goes to
the encryption algorithm as an input, and the same plaintext message goes to
the authentication algorithm as an input.
Minimum Hardware Configuration of the
proposed system
 Processor : Intel/AMD
 Speed : 1.1 GHz
 RAM : 256 MB
 Hard Disk : 20 GB
 Keyboard : Standard Keyboard
 Mouse : Standard Mouse
 Monitor : SVGA/LCD
Software Configuration of the proposed
system
 Operating System : Windows
 Front End : HTML, JSP, CSS
 Java Version : JDK 1.7
 Database : SQL Server 2005
 Database Connectivity : JDBC
References
 J. Carter and M. Wegman, “Universal classes of hash functions,” in
Proceedings of the ninth annual ACM symposium on Theory of computing–
STOC’77. ACM, 1977, pp. 106–112.
 M. Wegman and J. Carter, “New classes and applications of hash functions,”
in 20th Annual Symposium on Foundations of Computer Science–FOCS’79.
IEEE, 1979, pp. 175–182.
 L. Carter and M. Wegman, “Universal hash functions,” Journal of Computer
and System Sciences, vol. 18, no. 2, pp. 143–154, 1979.
 M. Wegman and L. Carter, “New hash functions and their use in authentication
and set equality,” Journal of Computer and System Sciences, vol. 22, no. 3,
pp. 265–279, 1981.
 J. Bierbrauer, “A2-codes from universal hash classes,” in Advances in
Cryptology–EUROCRYPT’95, vol. 921, Lecture Notes in Computer Science.
Springer, 1995, pp. 311–318.

More Related Content

What's hot

Ipv6 the next generation protocol
Ipv6 the next generation protocolIpv6 the next generation protocol
Ipv6 the next generation protocol
PRADEEP Cheekatla
 
Security testing
Security testingSecurity testing
Security testing
baskar p
 

What's hot (20)

Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Chapter 32
Chapter 32Chapter 32
Chapter 32
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Ipv6 the next generation protocol
Ipv6 the next generation protocolIpv6 the next generation protocol
Ipv6 the next generation protocol
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Web Security
Web SecurityWeb Security
Web Security
 
Unit 3
Unit 3Unit 3
Unit 3
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1
 
Mail Server Configuration with Cisco Packet Tracer
Mail Server Configuration with Cisco Packet TracerMail Server Configuration with Cisco Packet Tracer
Mail Server Configuration with Cisco Packet Tracer
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Security testing
Security testingSecurity testing
Security testing
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
Hybrid Topology Design in Cisco Packet Tracer
Hybrid Topology Design in Cisco Packet TracerHybrid Topology Design in Cisco Packet Tracer
Hybrid Topology Design in Cisco Packet Tracer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Networks software
Networks softwareNetworks software
Networks software
 

Viewers also liked

Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTeMobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Janet Jaiswal
 
Ville et développement durable centre urbain septembre 2011
Ville et développement durable centre urbain septembre 2011Ville et développement durable centre urbain septembre 2011
Ville et développement durable centre urbain septembre 2011
Centre Urbain - Stadswinkel
 
Broadband wireless communications
Broadband wireless communicationsBroadband wireless communications
Broadband wireless communications
Nagu Omsi
 

Viewers also liked (20)

Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
[ppt]
[ppt][ppt]
[ppt]
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
MIS5101 Week 13 Security Privacy Data Mining
MIS5101 Week 13 Security Privacy Data MiningMIS5101 Week 13 Security Privacy Data Mining
MIS5101 Week 13 Security Privacy Data Mining
 
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTeMobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
Mobile Privacy Consumer Survey Results by Harris Interactive & TRUSTe
 
Advances In Satellite Communication
Advances In Satellite CommunicationAdvances In Satellite Communication
Advances In Satellite Communication
 
Réseaux sociaux et réseaux de transport urbain
Réseaux sociaux et réseaux de transport urbainRéseaux sociaux et réseaux de transport urbain
Réseaux sociaux et réseaux de transport urbain
 
Ville et développement durable centre urbain septembre 2011
Ville et développement durable centre urbain septembre 2011Ville et développement durable centre urbain septembre 2011
Ville et développement durable centre urbain septembre 2011
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and payment
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Etat des lieux synthétique du transport public
Etat des lieux synthétique du transport publicEtat des lieux synthétique du transport public
Etat des lieux synthétique du transport public
 
Ubiquité et intelligence ambiante
Ubiquité et intelligence ambianteUbiquité et intelligence ambiante
Ubiquité et intelligence ambiante
 
Smart Transportation Industry Trends and Market Forecasts -2022
Smart Transportation Industry Trends and  Market Forecasts -2022Smart Transportation Industry Trends and  Market Forecasts -2022
Smart Transportation Industry Trends and Market Forecasts -2022
 
Yinhai Wang - Smart Transportation: Research under Smart Cities Context - GCS16
Yinhai Wang - Smart Transportation: Research under Smart Cities Context - GCS16Yinhai Wang - Smart Transportation: Research under Smart Cities Context - GCS16
Yinhai Wang - Smart Transportation: Research under Smart Cities Context - GCS16
 
Smart Transportation Management
Smart Transportation ManagementSmart Transportation Management
Smart Transportation Management
 
Transport urbain
Transport urbainTransport urbain
Transport urbain
 
Broadband wireless communications
Broadband wireless communicationsBroadband wireless communications
Broadband wireless communications
 
Zywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access ControlZywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access Control
 

Similar to Efficient authentication for mobile and pervasive computing

Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
sandyBS
 

Similar to Efficient authentication for mobile and pervasive computing (20)

Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computing
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
 
Information and data security cryptography and network security
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network security
 
561 1530-1-pb (1)
561 1530-1-pb (1)561 1530-1-pb (1)
561 1530-1-pb (1)
 
W04404135146
W04404135146W04404135146
W04404135146
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
 
A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...
 
An Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNAn Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSN
 
5215ijcis01
5215ijcis015215ijcis01
5215ijcis01
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc NetworkA Two Tiered Data Origin Authentication Scheme for Adhoc Network
A Two Tiered Data Origin Authentication Scheme for Adhoc Network
 
Ijretm 2014-sp-043
Ijretm 2014-sp-043Ijretm 2014-sp-043
Ijretm 2014-sp-043
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYDIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITY
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
 

More from IGEEKS TECHNOLOGIES

More from IGEEKS TECHNOLOGIES (20)

BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
 
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
 
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
 
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
 
IEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project ListIEEE 2017-18 Final Year Project List
IEEE 2017-18 Final Year Project List
 
Diploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titlesDiploma 2016 17 electronics & electrical titles
Diploma 2016 17 electronics & electrical titles
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
BE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects BangaloreBE Mechanical Engineering Final Year Academic Projects Bangalore
BE Mechanical Engineering Final Year Academic Projects Bangalore
 
final year diploma projects training institutes bangalore
final year diploma projects training institutes bangalorefinal year diploma projects training institutes bangalore
final year diploma projects training institutes bangalore
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Lbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginitionLbp based edge-texture features for object recoginition
Lbp based edge-texture features for object recoginition
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 

Recently uploaded

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Recently uploaded (20)

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Efficient authentication for mobile and pervasive computing

  • 1. Efficient Authentication for Mobile and Pervasive Computing BASEL ALOMAIR, MEMBER, IEEE AND RADHA POOVENDRAN, SENIOR MEMBER, IEEE
  • 2. Abstract With today’s technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.
  • 3. Existing System There are two important observations to make about existing MAC algorithms. First, they are designed independently of any other operations required to be performed on the message to be authenticated. For instance, if the authenticated message must also be encrypted, existing MACs are not designed to utilize the functionality that can be provided by the underlying encryption algorithm. Second, most existing MACs are designed for the general computer communication systems, independently of the properties that messages can possess. For example, one can find that most existing MACs are inefficient when the messages to be authenticated are short. (For instance, UMAC, the fastest reported message authentication code in the cryptographic literature, has undergone large algorithmic changes to increase its speed on short messages ).
  • 4. Disadvantages of proposed system  Existing MACs are not designed to utilize the functionality that can be provided by the underlying encryption algorithm.  Most existing MACs are designed for the general computer communication systems, independently of the properties that messages can possess.
  • 5. Proposed System We propose the following research question: if there is an application in which messages that need to be exchanged are short and both their privacy and integrity need to be preserved, can one do better than simply encrypting the messages using an encryption algorithm and authenticating them using standard MAC algorithm? We answer the question by proposing two new techniques for authenticating short encrypted messages that are more efficient than existing approaches. In the first technique, we utilize the fact that the message to be authenticated is also encrypted, with any secure encryption algorithm, to append a short random string to be used in the authentication process.
  • 6. Advantages of proposed system  More security, using two concepts one is mobile computing and another one is pervasive computing.  The random strings used for different operations are independent, the authentication algorithm can benefit from the simplicity of unconditional secure authentication to allow for faster and more efficient authentication, without the difficulty to manage one-time keys. In the second technique, we make the extra assumption that the used encryption algorithm is block cipher based to further improve the computational efficiency of the first technique.
  • 8. Modules The proposed system has the following modules:  Authenticating Short Encrypted Messages  Security Model  Data Privacy  Security of the Authenticated Encryption Composition
  • 9. Module Description  Authenticating Short Encrypted Messages In this module, we describe our first authentication scheme that can be used with any IND-CPA secure encryption algorithm .An important assumption we make is that messages to be authenticated are no longer than a predefined length. This includes applications in which messages are of fixed length that is known a priori, such as RFID systems in which tags need to authenticate their identifiers, sensor nodes reporting events that belong to certain domain or measurements within a certain range, etc. The novelty of the proposed scheme is to utilize the encryption algorithm to deliver a random string and use it to reach the simplicity and efficiency of one-time pad authentication without the need to manage impractically long keys.
  • 10.  Security Model A message authentication scheme consists of a signing algorithm S and a verifying algorithm V. The signing algorithm might be probabilistic, while the verifying one is usually not. Associated with the scheme are parameters and N describing the length of the shared key and the resulting authentication tag, respectively. On input an `-bit key k and a message m, algorithm S outputs an N-bit string called the authentication tag, or the MAC of m. On input an `-bit key k, a message m, and an N-bit tag , algorithm V outputs a bit, with 1 standing for accept and 0 for reject. We ask for a basic validity condition, namely that authentic tags are accepted with probability one.) for a random but hidden choice of k. A can query S to generate a tag for a plaintext of its choice and ask the verifier V to verify that _ is a valid tag for the plaintext. Formally, A’s attack on the scheme is described by the following experiment: 1) A random string of length ` is selected as the shared secret. 2) Suppose A makes a signing query on a message m. Then the oracle computes an authentication tag _ = S(k; m)and returns it to A. (Since S may be probabilistic, this step requires making the necessary underlying choice of a random string for S, anew for each signing query.) 3) Suppose A makes a verify query (m; _ ). The oracle computes the decision d = V(k; m; _ ) and returns it to A.
  • 11.  Data Privacy Recall that two pieces of information are transmitted to the intended receiver (the cipher text and the authentication tag),both of which are functions of the private plaintext message. Now, when it comes to the authentication tag, observe that then once r serves as a one-time key (similar to the role r plays in the construction of Section . The formal analysis that the authentication tag does not compromise message privacy is the same as the one provided . The cipher text of equation ,on the other hand, is a standard CBC encryption and its security is well-studied; thus, we give the theorem statement below without a formal proof (interested readers may refer to textbooks in cryptography.
  • 12.  Security of the Authenticated Encryption Composition In this module, it defined two notions of integrity for authenticated encryption systems: the first is integrity of plaintext (INT-PTXT) and the second is integrity of cipher text (INT-CTXT). Combined with encryption algorithms that provide in-distinguish ability under chosen plaintext attacks(IND-CPA), the security of different methods for constructing generic compositions is analyzed. Note that our construction is an instance of the Encrypt-and- Authenticate (E&A) generic composition since the plaintext message goes to the encryption algorithm as an input, and the same plaintext message goes to the authentication algorithm as an input.
  • 13. Minimum Hardware Configuration of the proposed system  Processor : Intel/AMD  Speed : 1.1 GHz  RAM : 256 MB  Hard Disk : 20 GB  Keyboard : Standard Keyboard  Mouse : Standard Mouse  Monitor : SVGA/LCD
  • 14. Software Configuration of the proposed system  Operating System : Windows  Front End : HTML, JSP, CSS  Java Version : JDK 1.7  Database : SQL Server 2005  Database Connectivity : JDBC
  • 15. References  J. Carter and M. Wegman, “Universal classes of hash functions,” in Proceedings of the ninth annual ACM symposium on Theory of computing– STOC’77. ACM, 1977, pp. 106–112.  M. Wegman and J. Carter, “New classes and applications of hash functions,” in 20th Annual Symposium on Foundations of Computer Science–FOCS’79. IEEE, 1979, pp. 175–182.  L. Carter and M. Wegman, “Universal hash functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979.  M. Wegman and L. Carter, “New hash functions and their use in authentication and set equality,” Journal of Computer and System Sciences, vol. 22, no. 3, pp. 265–279, 1981.  J. Bierbrauer, “A2-codes from universal hash classes,” in Advances in Cryptology–EUROCRYPT’95, vol. 921, Lecture Notes in Computer Science. Springer, 1995, pp. 311–318.