research centers


Search results: Found 2

Listing 1 - 2 of 2
Sort by

Article
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function

Author: Muna Mohammed Al-Nayar
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2011 Volume: 29 Issue: 16 Pages: 3291-3301
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Internet has opened new channel of communication enabling an e-mail to be sent to a relative thousands of kilometers away. This medium of communication opens doors for virtually free mass e-mailing, reaching out to hundreds of thousands users around the globe within seconds, so e-mail becomes the most popular form of communication today. E-mail systems have suffered from increasing attacking problem that threatens the validity and integrity of communication. Many differentapproaches for fighting this attack have been proposed, ranging from various sender authentication protocols to encrypt the message itself. This paper demonstrates a promising protocol. The proposed protocol ensures the authentication and integrity of the data and avoids the problem of key distribution or breaking by using multiplerandom keys generated automatically during communication session.


Article
HMAC Modification Using New Random Key Generator

Author: Dr. Shaimaa H. Shaker
Journal: IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم ISSN: 18119212 Year: 2014 Volume: 14 Issue: 1 Pages: 72-82
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Abstract –Cryptographic hash functions have been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and the most important of which is their use in the composition of efficient Message Authentication Codes (MACs). Cryptanalysts cannot break the encryption code authorization message because they could not generate the message sets without key predictors.This paper introduces anew way to achieve hash code authorization message to increase the strength of the code, reluctance to Birthday attack, and key’s exhaustive search. Secret key with randomness propertyis generated with the assistance proposed algorithm called AKG (Algorithm of Key Generator) that will be hash function. AKG is used to generate a secret key with decimal digits instead of (0,1).The proposed AKG introduces a method that uses three inputs of (0..9994) states instead of (0,1) states.The output of AKG is a random key from key generator using 9995 tables. So the new method provides authentic and integral properties.

Listing 1 - 2 of 2
Sort by
Narrow your search

Resource type

article (2)


Language

English (2)


Year
From To Submit

2014 (1)

2011 (1)