MMAC: Fast and Secure Message Authentication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 135 | Monthly Hits: ⮙11

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 12, December 2017

MMAC: Fast and Secure Message Authentication

Mohammed Ali Mohammed, Loay K. Abood, Makki Maliki

The Mathematical Message Authentication Code (MMAC) is a well-known method to provide integrity of message. This works aims to proof that the MMAC is more reliable than exciting/slandered algorithms. The comparison will take place based on describing the analysis result of the aspects of fast, complexity, and security with other algorithms. These algorithms are CMAC-AES (Cipher-Based Message Authentication Code-Advanced Encryption Standard), MAC-Triple-DES (Message Authentication Code-Triple-Data Encryption Standard) and CMAC-DES (Cipher-Based Message Authentication Code-Data Encryption Standard) MACs algorithm. While we give HMAC-SHA-128 (Secure Hash Algorithm) HMAC algorithm more comparable attention for its important. The dataset is a text which written in English language. There are three dataset have a different size the first one is The Irish Penny Journal book, while the second dataset is Notes of hospital life book, and third dataset is The Life of Robert book. The result of the comparison shows without any doubt that the MMAC algorithm is faster, more secure and less complexity.

Keywords: MMAC, Mathematical Message Authentication Code, Message Integrity, Message Authentication, MAC

Edition: Volume 6 Issue 12, December 2017

Pages: 576 - 579

Share this Article

How to Cite this Article?

Mohammed Ali Mohammed, Loay K. Abood, Makki Maliki, "MMAC: Fast and Secure Message Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20178703, Volume 6 Issue 12, December 2017, 576 - 579

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'MMAC'

Downloads: 129 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 352 - 356

A Survey on Dataset Recognition of 3D Face with Missing Parts

Madhura Patil

Share this Article

Downloads: 135 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017

Pages: 576 - 579

MMAC: Fast and Secure Message Authentication

Mohammed Ali Mohammed, Loay K. Abood, Makki Maliki

Share this Article

Similar Articles with Keyword 'Message Authentication'

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 107 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Downloads: 110 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 997 - 1001

Secure and Privacy Preserving Navigation in VANET

Sudarshana A. Abbad, S. P. Godse

Share this Article

Downloads: 116 | Weekly Hits: ⮙3 | Monthly Hits: ⮙17

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1065 - 1068

Survey Paper on Pervasive Computing for Mobile Security

Kulashree Joshi, Sulochana Sonkamble

Share this Article

Similar Articles with Keyword 'MAC'

Downloads: 126 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 479 | Weekly Hits: ⮙7 | Monthly Hits: ⮙83

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 83 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Downloads: 179 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article



Top