International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015


Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi | K. Kumar [9]


Abstract: Nowadays coming technology, many applications dependupon the existence of small devices that can exchange, share the information and formcommunication networks. In an expressive manner of such applications, the confidentiality and integrity of the communicated messages are of particular interest area. In this paper work, we going to propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. The main use of one way cryptographic hash function for message authentication. A popular example of iterated cryptographic hash functions in the design of message authentication codes is HMAC, which was proposed by Bell are et al.


Keywords: communication network, two novel technique for authenticating, cryptography hash functions, secure authentication, MAC Algorithms,


Edition: Volume 4 Issue 3, March 2015,


Pages: 1043 - 104


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

P. Bakkiya Lakshmi, K. Kumar, "Comparative Study of MAC Algorithms in Pervasive Computing Environment", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1043-104, https://www.ijsr.net/get_abstract.php?paper_id=SUB152272

Similar Articles with Keyword 'communication network'

Downloads: 107

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru | Ramadevi Polagani

Share this Article

Downloads: 120

Research Paper, Information Technology, India, Volume 5 Issue 5, May 2016

Pages: 1049 - 1054

Role of ICT for Rural Development in Haryana

Kamaldeep Sangwan | Komal [68]

Share this Article
Top