SlideShare a Scribd company logo
1 of 1
Impulse Technologies
                                      Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
          An Efficient Homomorphic MAC with Small Key Size for
                     Authentication in Network Coding
   Abstract
          Recently, homomorphic message authentication code (MAC) schemes have been
   proposed to resist against pollution attacks in network coding. However, existing
   methods face a common challenge: the generated MAC $t$ belongs to a small finite field
   $mathbb{F}_{q}$, which means that an adversary could attack by randomly guessing the
   value of $t$, and succeed with probability $1/q$. Since $q$ is a predetermined system
   parameter which is typically set as $2^8$, the resulted security $1/256$ could be
   unsatisfactory in practice. In this paper, we propose an efficient homomorphic MAC for
   authentication in network coding. The proposed method achieves a reliable security
   parameter $1/q^l$ using only one key, where $l$ could be chosen according to different
   security requirements. Compared with previous approaches that using multiple tags, the
   proposed homomorphic MAC has both low computation and communication overheads.




  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                          1

More Related Content

Viewers also liked (6)

Ismawardah, s
Ismawardah, sIsmawardah, s
Ismawardah, s
 
311-2145 2ND AVENUE - WHITEHORSE REAL ESTATE - YUKON HOMES FOR SALE
311-2145 2ND AVENUE - WHITEHORSE REAL ESTATE - YUKON HOMES FOR SALE311-2145 2ND AVENUE - WHITEHORSE REAL ESTATE - YUKON HOMES FOR SALE
311-2145 2ND AVENUE - WHITEHORSE REAL ESTATE - YUKON HOMES FOR SALE
 
งาน
งานงาน
งาน
 
Professional Scrum Master 1 Certification
Professional Scrum Master 1 CertificationProfessional Scrum Master 1 Certification
Professional Scrum Master 1 Certification
 
Surat lamaran widji
Surat lamaran widjiSurat lamaran widji
Surat lamaran widji
 
experience certificate ghantoot
experience certificate ghantootexperience certificate ghantoot
experience certificate ghantoot
 

Similar to 9

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
IJCNCJournal
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
TAM new report
TAM new reportTAM new report
TAM new report
Suzit Punk
 

Similar to 9 (20)

12
1212
12
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
 
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICESRMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
 
Information and data security cryptography and network security
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network security
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
 

More from Impulse_Technology1

More from Impulse_Technology1 (20)

11
1111
11
 
10
1010
10
 
8
88
8
 
7
77
7
 
6
66
6
 
5
55
5
 
1
11
1
 
30
3030
30
 
29
2929
29
 
28
2828
28
 
27
2727
27
 
9
99
9
 
8
88
8
 
7
77
7
 
6
66
6
 
5
55
5
 
4
44
4
 
3
33
3
 
2
22
2
 
1
11
1
 

9

  • 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding Abstract Recently, homomorphic message authentication code (MAC) schemes have been proposed to resist against pollution attacks in network coding. However, existing methods face a common challenge: the generated MAC $t$ belongs to a small finite field $mathbb{F}_{q}$, which means that an adversary could attack by randomly guessing the value of $t$, and succeed with probability $1/q$. Since $q$ is a predetermined system parameter which is typically set as $2^8$, the resulted security $1/256$ could be unsatisfactory in practice. In this paper, we propose an efficient homomorphic MAC for authentication in network coding. The proposed method achieves a reliable security parameter $1/q^l$ using only one key, where $l$ could be chosen according to different security requirements. Compared with previous approaches that using multiple tags, the proposed homomorphic MAC has both low computation and communication overheads. Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1