message digest

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1791 Experts worldwide ranked by ideXlab platform

Shanyu Tang - One of the best experts on this subject based on the ideXlab platform.

  • an efficient and secure voip communication system with chaotic mapping and message digest
    Multimedia Systems, 2018
    Co-Authors: Yijing Jiang, Shanyu Tang
    Abstract:

    As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers' attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.

  • An efficient and secure VoIP communication system with chaotic mapping and message digest
    Multimedia Systems, 2018
    Co-Authors: Yijing Jiang, Shanyu Tang
    Abstract:

    © 2017 Springer-Verlag GmbH Germany As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers’ attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.

Yijing Jiang - One of the best experts on this subject based on the ideXlab platform.

  • an efficient and secure voip communication system with chaotic mapping and message digest
    Multimedia Systems, 2018
    Co-Authors: Yijing Jiang, Shanyu Tang
    Abstract:

    As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers' attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.

  • An efficient and secure VoIP communication system with chaotic mapping and message digest
    Multimedia Systems, 2018
    Co-Authors: Yijing Jiang, Shanyu Tang
    Abstract:

    © 2017 Springer-Verlag GmbH Germany As one of the most popular real-time services on the Internet, Voice over internet protocol (VoIP) has attracted researchers’ attention in the information security field for its characters of real-time and high flow. To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. In the proposed algorithm, secret data were divided into blocks after being encrypted with a block cipher, and then each block of secret data was embedded into VoIP streaming packets randomly using a chaotic mapping. The symmetric key was distributed through an efficient and secure channel, and the message digest was implemented to protect the integrity of secret data. The experimental data were collected by comparing audio data between the sender and the receiver. The experimental results indicated that data embedding had little impact on the quality of speech. Besides, statistical analysis could not detect the secret data embedded in VoIP streams using the block cipher and random numbers generated from chaotic mapping. The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.

Qiang Ye - One of the best experts on this subject based on the ideXlab platform.

  • mda message digest based authentication for mobile cloud computing
    IEEE International Conference on Cloud Computing Technology and Science, 2016
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    The emerging area of mobile cloud computing will influence the future of varied applications, such as electronic commerce and health informatics. It is expected to rise in popularity over other models in cloud computing. This is facilitated by its simplicity, accessibility and ease of use. With mobile cloud computing, resource-constrained mobile devices could capitalize on the computation/storage resources of cloud servers via communication networks. Despite the advantage of this innovative computing model, mobile devices in mobile cloud computing are open to more security risks because they often have to access cloud servers through untrusted networks from different locations. Therefore, security is a critical problem to be tackled in mobile cloud computing. One of the most important aspects of mobile cloud computing security is to establish authenticated communication sessions between mobile devices and cloud servers. In this paper, we present a novel authentication scheme, message digest-based Authentication (MDA). Technically, MDA strategically incorporates hashing, in addition to traditional user ID and passwords, to achieve mutual authentication. The effectiveness of MDA is validated with Scyther, a widely-used security protocol analyzer. Our experimental results indicate that MDA is capable of withstanding a variety of different security attacks, such as man-in-the-middle, replay attacks, etc.

  • IPCCC - A light-weight authentication scheme based on message digest and location for mobile cloud computing
    2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), 2014
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computation capacity. This places the onus of establishing and maintaining secure communication sessions on the resourceful cloud servers. We propose a novel mutual authentication scheme, “message digest and Location based Authentication (MDLA)”, which involves symmetric key operations. In addition to computational simplicity, MDLA achieves integrity through message digest, and ensures the unpredictability of keys using location vector and timestamp.

  • A light-weight authentication scheme based on message digest and location for mobile cloud computing
    2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), 2014
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computation capacity. This places the onus of establishing and maintaining secure communication sessions on the resourceful cloud servers. We propose a novel mutual authentication scheme, “message digest and Location based Authentication (MDLA)”, which involves symmetric key operations. In addition to computational simplicity, MDLA achieves integrity through message digest, and ensures the unpredictability of keys using location vector and timestamp.

  • IPCCC - message digest as authentication entity for mobile cloud computing
    2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), 2013
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    With the development of the World Wide Web (WWW) and virtualization technologies, cloud computing has started to play a key role in the new computation era. Cloud computing can be used to serve a wide range of applications, from personal to organizational, by means of various infrastructure, software, and platform services. However, the ease of access from terminal devices to powerful processing units and information-rich databases makes the cloud susceptible to a variety of different attacks. The widespread use of cloud computing brings with it a hoard of security, privacy and integrity issues. In this paper, we propose an innovative authentication scheme for mobile cloud computing, MDA. The proposed scheme only uses existing hardware and platforms to prevent most of the potential attacks during the authentication process between a mobile device and the cloud. Technically, the encrypted hashed message (i.e. message digest) is employed by MDA to achieve secure authentication. The performance of MDA is evaluated via protocol simulation and security analysis.

  • message digest as authentication entity for mobile cloud computing
    2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), 2013
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    With the development of the World Wide Web (WWW) and virtualization technologies, cloud computing has started to play a key role in the new computation era. Cloud computing can be used to serve a wide range of applications, from personal to organizational, by means of various infrastructure, software, and platform services. However, the ease of access from terminal devices to powerful processing units and information-rich databases makes the cloud susceptible to a variety of different attacks. The widespread use of cloud computing brings with it a hoard of security, privacy and integrity issues. In this paper, we propose an innovative authentication scheme for mobile cloud computing, MDA. The proposed scheme only uses existing hardware and platforms to prevent most of the potential attacks during the authentication process between a mobile device and the cloud. Technically, the encrypted hashed message (i.e. message digest) is employed by MDA to achieve secure authentication. The performance of MDA is evaluated via protocol simulation and security analysis.

M.b. Sherigar - One of the best experts on this subject based on the ideXlab platform.

  • VLSI Design - A pipelined parallel processor to implement MD4 message digest algorithm on Xilinx FPGA
    Proceedings Eleventh International Conference on VLSI Design, 1998
    Co-Authors: M.b. Sherigar, A.s. Mahadevan, K.s. Kumar, S Sumam David
    Abstract:

    The paper presents a pipelined parallel processor architecture design to implement the MD4 message digest algorithm which computes the message digest or the fingerprint of 128 bit fixed length, for any arbitrary length of input message. The processor implements the arithmetic, logic and circular shift operations by a pipelined parallel process. The architecture is designed to suit the design flexibility of the Xilinx Field Programmable Gate Arrays (FPGAs) The processor reads the message from an external RAM, 16-bit at a time and internal operations are performed with 32-bit data. The major advantage of the design is increased speed of computation and minimum hardware. The processor computes the digest with a speed approximately three times faster than the software version implemented in DSP processors.

  • A pipelined parallel processor to implement MD4 message digest algorithm on Xilinx FPGA
    Proceedings Eleventh International Conference on VLSI Design, 1998
    Co-Authors: M.b. Sherigar, A.s. Mahadevan, K.s. Kumar, S. David
    Abstract:

    The paper presents a pipelined parallel processor architecture design to implement the MD4 message digest algorithm which computes the message digest or the fingerprint of 128 bit fixed length, for any arbitrary length of input message. The processor implements the arithmetic, logic and circular shift operations by a pipelined parallel process. The architecture is designed to suit the design flexibility of the Xilinx Field Programmable Gate Arrays (FPGAs) The processor reads the message from an external RAM, 16-bit at a time and internal operations are performed with 32-bit data. The major advantage of the design is increased speed of computation and minimum hardware. The processor computes the digest with a speed approximately three times faster than the software version implemented in DSP processors.

Srinivas Sampalli - One of the best experts on this subject based on the ideXlab platform.

  • mda message digest based authentication for mobile cloud computing
    IEEE International Conference on Cloud Computing Technology and Science, 2016
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    The emerging area of mobile cloud computing will influence the future of varied applications, such as electronic commerce and health informatics. It is expected to rise in popularity over other models in cloud computing. This is facilitated by its simplicity, accessibility and ease of use. With mobile cloud computing, resource-constrained mobile devices could capitalize on the computation/storage resources of cloud servers via communication networks. Despite the advantage of this innovative computing model, mobile devices in mobile cloud computing are open to more security risks because they often have to access cloud servers through untrusted networks from different locations. Therefore, security is a critical problem to be tackled in mobile cloud computing. One of the most important aspects of mobile cloud computing security is to establish authenticated communication sessions between mobile devices and cloud servers. In this paper, we present a novel authentication scheme, message digest-based Authentication (MDA). Technically, MDA strategically incorporates hashing, in addition to traditional user ID and passwords, to achieve mutual authentication. The effectiveness of MDA is validated with Scyther, a widely-used security protocol analyzer. Our experimental results indicate that MDA is capable of withstanding a variety of different security attacks, such as man-in-the-middle, replay attacks, etc.

  • IPCCC - A light-weight authentication scheme based on message digest and location for mobile cloud computing
    2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), 2014
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computation capacity. This places the onus of establishing and maintaining secure communication sessions on the resourceful cloud servers. We propose a novel mutual authentication scheme, “message digest and Location based Authentication (MDLA)”, which involves symmetric key operations. In addition to computational simplicity, MDLA achieves integrity through message digest, and ensures the unpredictability of keys using location vector and timestamp.

  • A light-weight authentication scheme based on message digest and location for mobile cloud computing
    2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), 2014
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    The security of data transmission is of paramount importance to mobile cloud computing. For security purposes, the data transmission in mobile cloud computing typically requires a mutually-authenticated environment for mobile devices and cloud servers. SSH (secure shell) could be used to satisfy the requirement. However, it makes the authentication process computationally expensive for mobile devices because it involves public key cryptosystem and mobile devices are relatively restricted in terms of computation capacity. This places the onus of establishing and maintaining secure communication sessions on the resourceful cloud servers. We propose a novel mutual authentication scheme, “message digest and Location based Authentication (MDLA)”, which involves symmetric key operations. In addition to computational simplicity, MDLA achieves integrity through message digest, and ensures the unpredictability of keys using location vector and timestamp.

  • IPCCC - message digest as authentication entity for mobile cloud computing
    2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), 2013
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    With the development of the World Wide Web (WWW) and virtualization technologies, cloud computing has started to play a key role in the new computation era. Cloud computing can be used to serve a wide range of applications, from personal to organizational, by means of various infrastructure, software, and platform services. However, the ease of access from terminal devices to powerful processing units and information-rich databases makes the cloud susceptible to a variety of different attacks. The widespread use of cloud computing brings with it a hoard of security, privacy and integrity issues. In this paper, we propose an innovative authentication scheme for mobile cloud computing, MDA. The proposed scheme only uses existing hardware and platforms to prevent most of the potential attacks during the authentication process between a mobile device and the cloud. Technically, the encrypted hashed message (i.e. message digest) is employed by MDA to achieve secure authentication. The performance of MDA is evaluated via protocol simulation and security analysis.

  • message digest as authentication entity for mobile cloud computing
    2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), 2013
    Co-Authors: Srinivas Sampalli, Qiang Ye
    Abstract:

    With the development of the World Wide Web (WWW) and virtualization technologies, cloud computing has started to play a key role in the new computation era. Cloud computing can be used to serve a wide range of applications, from personal to organizational, by means of various infrastructure, software, and platform services. However, the ease of access from terminal devices to powerful processing units and information-rich databases makes the cloud susceptible to a variety of different attacks. The widespread use of cloud computing brings with it a hoard of security, privacy and integrity issues. In this paper, we propose an innovative authentication scheme for mobile cloud computing, MDA. The proposed scheme only uses existing hardware and platforms to prevent most of the potential attacks during the authentication process between a mobile device and the cloud. Technically, the encrypted hashed message (i.e. message digest) is employed by MDA to achieve secure authentication. The performance of MDA is evaluated via protocol simulation and security analysis.