scholarly journals The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)

Author(s):  
J. Song ◽  
R. Poovendran ◽  
J. Lee ◽  
T. Iwata
2017 ◽  
Vol 15 (2) ◽  
pp. 32-41
Author(s):  
S A ONASHOGA ◽  
O OYELEKE ◽  
O A OJESANMI ◽  
A A AGBOOLA

Transmission of information via unsecured channel requires confidentiality, authorization and authentication as part of major factors that must be put into consideration. This work proposes a scheme that can take care of these major factors at once. The method involves a multi-level approach that comprises of a key exchange protocol, a message authentication code, a key derivation function and a symmetric encryption known as polyalphabetic substitution that makes use of a 94x94 Vigenere table. The four cryptographic techniques are combined to form an encryption protocol, coined MLES for a message to be securely transmitted. In order to test the functionality of MLES scheme, it was implemented using Java 1.8.0 and tested on a text data. The result shows a feasible protocol that can secure a message in steganography.


Author(s):  
Jessy Ayala

The focus of this research is to analyze the results of encrypting audio using various authenticated encryption algorithms implemented in the Python cryptography library for ensuring authenticity and confidentiality of the original contents. The Advanced Encryption Standard (AES) is used as the underlying cryptographic primitive in conjunction with various modes including Galois Counter Mode (GCM), Counter with Cipher Block Chaining Message Authentication Code (CCM), and Cipher Block Chaining (CBC) with Keyed-Hashing for encrypting a relatively small audio file. The resulting encrypted audio shows similarity in the variance when encrypting using AES-GCM and AES-CCM. There is a noticeable reduction in variance of the performed encodings and an increase in the amount of time it takes to encrypt and decrypt the same audio file using AES-CBC with Keyed-Hashing. In addition, the corresponding encrypted using this mode audio spans a longer duration. As a result, AES should either have GCM or CCM for an efficient and reliable authenticated encryption integration within a workflow.


2015 ◽  
Author(s):  
A. Dodd-Noble ◽  
S. Gundavelli ◽  
J. Korhonen ◽  
F. Baboescu ◽  
B. Weis

Sign in / Sign up

Export Citation Format

Share Document