An authenticated encryption based grouping proof protocol for RFID systems

2016 ◽  
Vol 9 (18) ◽  
pp. 5581-5590 ◽  
Author(s):  
Samad Rostampour ◽  
Nasour Bagheri ◽  
Mehdi Hosseinzadeh ◽  
Ahmad Khademzadeh
2014 ◽  
Vol 8 ◽  
pp. 6257-6266
Author(s):  
Il-Soo Jeon ◽  
Myung-Sik Kim ◽  
Eun-Jun Yoon

2018 ◽  
Vol 103 (1) ◽  
pp. 133-143 ◽  
Author(s):  
Wei Zhang ◽  
Shiming Qin ◽  
Shengming Wang ◽  
Longkai Wu ◽  
Baolin Yi
Keyword(s):  

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Sign in / Sign up

Export Citation Format

Share Document