Cryptography based Network Security Analysis using Secure Hashed Identity Message Authentication

Sakshi Pandey, Saurabh Lahoti
{"title":"Cryptography based Network Security Analysis using Secure Hashed Identity Message Authentication","authors":"Sakshi Pandey, Saurabh Lahoti","doi":"10.1109/ICICACS57338.2023.10100004","DOIUrl":null,"url":null,"abstract":"Network security, made at low cost, and the easily made system has won the prestige compared to wireless networks. Networks are widely used by laptop users in corporate and educational contexts. Secure communication is a challenge in networks. Limited memory resources and power constraints, and complex many key security mechanisms may not be compatible with resources. Network security is key management because it is a complex task of its controlled nature. However, some fundamental drawbacks among wireless storage media are that networks are highly vulnerable to encryption attacks. Therefore, it is very important to protect the data while transferring over the network. Proxy delays in Proxy Re-Encryption (PRE) programming and retrieval Proximity is a significant computational load unloading problem caused by the Lightweight Symmetric Asymmetric Encryption Algorithm (LSAE), and the use of asymmetric encryption of the user's decryption due to the operation and recalculation of the data owner's encryption. In order to resolve these issues, we propose a Secure Hashed Identity Message Authentication (SHIMA) which is used to verify information integrity and authentication. The estimated cost of re-encryption processing caused by network security is very efficient. The SHIMA algorithm can reduce end-to-end encryption and decryption provided by end-user's resource-controlled equipment. Safety and performance research is conducted, and the results show that our method is time-consuming and reduce delay performance safe and efficient. At the same time, the rating has found times the higher performance on these network clients and network servers. Based on this rating, it is recommended that this work be achieved and implemented in networking.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICACS57338.2023.10100004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Network security, made at low cost, and the easily made system has won the prestige compared to wireless networks. Networks are widely used by laptop users in corporate and educational contexts. Secure communication is a challenge in networks. Limited memory resources and power constraints, and complex many key security mechanisms may not be compatible with resources. Network security is key management because it is a complex task of its controlled nature. However, some fundamental drawbacks among wireless storage media are that networks are highly vulnerable to encryption attacks. Therefore, it is very important to protect the data while transferring over the network. Proxy delays in Proxy Re-Encryption (PRE) programming and retrieval Proximity is a significant computational load unloading problem caused by the Lightweight Symmetric Asymmetric Encryption Algorithm (LSAE), and the use of asymmetric encryption of the user's decryption due to the operation and recalculation of the data owner's encryption. In order to resolve these issues, we propose a Secure Hashed Identity Message Authentication (SHIMA) which is used to verify information integrity and authentication. The estimated cost of re-encryption processing caused by network security is very efficient. The SHIMA algorithm can reduce end-to-end encryption and decryption provided by end-user's resource-controlled equipment. Safety and performance research is conducted, and the results show that our method is time-consuming and reduce delay performance safe and efficient. At the same time, the rating has found times the higher performance on these network clients and network servers. Based on this rating, it is recommended that this work be achieved and implemented in networking.
基于密码学的安全哈希身份消息认证网络安全分析
与无线网络相比,网络安全、成本低、易于制作的系统赢得了声望。在公司和教育环境中,笔记本电脑用户广泛使用网络。安全通信是网络中的一个挑战。有限的内存资源和电源限制,以及复杂的许多关键安全机制可能与资源不兼容。网络安全是密钥管理,因为它是一项复杂的任务,它的控制性质。然而,无线存储介质的一些基本缺点是网络极易受到加密攻击。因此,在网络上传输数据时保护数据是非常重要的。代理重新加密(PRE)编程和检索邻近中的代理延迟是轻量级对称非对称加密算法(LSAE)和使用非对称加密的用户解密由于对数据所有者的加密进行操作和重新计算而导致的一个重要的计算负载卸载问题。为了解决这些问题,我们提出了一种安全哈希身份消息认证(SHIMA),用于验证信息的完整性和身份验证。由网络安全引起的重新加密处理的估计成本是非常有效的。该算法可以减少终端用户资源控制设备提供的端到端加密和解密。进行了安全性和性能研究,结果表明该方法耗时长,降低了延迟,性能安全高效。同时,在这些网络客户端和网络服务器上发现了更高的性能。基于这一评价,建议在组网中完成并实施这项工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信