Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
J. UCS 01/2011; 17:891-911.
Conference Paper: Building a block cipher mode of operation with feedback keys[Show abstract] [Hide abstract]
ABSTRACT: In this paper, we propose two block cipher modes of operation (BCMO for short), named the Key Stream Protection Chain mode (KSPC for short) and Output Dual Chaining mode (ODC for short), which differ from other existing BCMOs in that in the KSPC, the ciphertext block and in the ODC, the block cipher encryption unit's output are fed back to the encryption system to be one of the inputs of the next block ciphering. We also evaluate three existing BCMOs, including the Cipher Block Chaining mode (CBC), the Propagating Cipher Block Chaining mode (PCBC) and the Output Feedback mode (OFB), and discuss the security of the these modes when they face chosen-plaintext attacks. At last, we explain why our new BCMOs' security levels are higher than those of the existing three.Industrial Electronics (ISIE), 2013 IEEE International Symposium on; 01/2013
[Show abstract] [Hide abstract]
ABSTRACT: Recently, wireless communication has been popularly used in our everyday life. However, its secu-rity is a crucial work since messages are broadcasted via wireless channels through which hackers can intercept the massages and then know the contents of the messages. That is why security has been one of the most important issues in wireless communication studies. Encrypting messages to ciphertext is one of the methods to solve this problem. But, it also causes another problem, i.e., how to safely and confidentially encrypt and deliver security keys so that hackers have to spend a very long time before they can decrypt the ciphertext. In this paper, we proposed an authentication ap-proach, called the secure point-to-point encryption method (SePem for short), which integrates RSA, Diffie-Hellman PKDS and a stream cipher technique to provide users with a highly secure point-to-point wireless network without requiring a CA. According to the security analysis of this study, the SePem can efficiently and securely protect a wireless environment. Our simulation results show that the performance of this method can meet users' communication needs.
International Journal of Web and Grid Services 01/2015; 11(1):102. DOI:10.1504/IJWGS.2015.067158 · 1.58 Impact Factor
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.