{"title":"Cryptography based Network Security Analysis using Secure Hashed Identity Message Authentication","authors":"Sakshi Pandey, Saurabh Lahoti","doi":"10.1109/ICICACS57338.2023.10100004","DOIUrl":null,"url":null,"abstract":"Network security, made at low cost, and the easily made system has won the prestige compared to wireless networks. Networks are widely used by laptop users in corporate and educational contexts. Secure communication is a challenge in networks. Limited memory resources and power constraints, and complex many key security mechanisms may not be compatible with resources. Network security is key management because it is a complex task of its controlled nature. However, some fundamental drawbacks among wireless storage media are that networks are highly vulnerable to encryption attacks. Therefore, it is very important to protect the data while transferring over the network. Proxy delays in Proxy Re-Encryption (PRE) programming and retrieval Proximity is a significant computational load unloading problem caused by the Lightweight Symmetric Asymmetric Encryption Algorithm (LSAE), and the use of asymmetric encryption of the user's decryption due to the operation and recalculation of the data owner's encryption. In order to resolve these issues, we propose a Secure Hashed Identity Message Authentication (SHIMA) which is used to verify information integrity and authentication. The estimated cost of re-encryption processing caused by network security is very efficient. The SHIMA algorithm can reduce end-to-end encryption and decryption provided by end-user's resource-controlled equipment. Safety and performance research is conducted, and the results show that our method is time-consuming and reduce delay performance safe and efficient. At the same time, the rating has found times the higher performance on these network clients and network servers. Based on this rating, it is recommended that this work be achieved and implemented in networking.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICACS57338.2023.10100004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Network security, made at low cost, and the easily made system has won the prestige compared to wireless networks. Networks are widely used by laptop users in corporate and educational contexts. Secure communication is a challenge in networks. Limited memory resources and power constraints, and complex many key security mechanisms may not be compatible with resources. Network security is key management because it is a complex task of its controlled nature. However, some fundamental drawbacks among wireless storage media are that networks are highly vulnerable to encryption attacks. Therefore, it is very important to protect the data while transferring over the network. Proxy delays in Proxy Re-Encryption (PRE) programming and retrieval Proximity is a significant computational load unloading problem caused by the Lightweight Symmetric Asymmetric Encryption Algorithm (LSAE), and the use of asymmetric encryption of the user's decryption due to the operation and recalculation of the data owner's encryption. In order to resolve these issues, we propose a Secure Hashed Identity Message Authentication (SHIMA) which is used to verify information integrity and authentication. The estimated cost of re-encryption processing caused by network security is very efficient. The SHIMA algorithm can reduce end-to-end encryption and decryption provided by end-user's resource-controlled equipment. Safety and performance research is conducted, and the results show that our method is time-consuming and reduce delay performance safe and efficient. At the same time, the rating has found times the higher performance on these network clients and network servers. Based on this rating, it is recommended that this work be achieved and implemented in networking.