[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Enhancements of Encryption Method Used in SDEx

  • Conference paper
  • First Online:
Computer Networks (CN 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 718))

Included in the following conference series:

  • 1081 Accesses

Abstract

In the paper, we present enhancements of the encryption method for secure data transmission used in Secure Data Exchange method (SDEx) [1,2,3]. Potential weaknesses and possible attacks have been previously described in [4]. The new version of the encryption method is immune to indicated in [4] vulnerabilities connected with the potential knowledge of the part of the original message and uneven distribution of bits in the message blocks. In the new solution, we use also Davies-Meyer scheme in order to enhance immunity to meet-in-the-middle attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hłobaż, A., Podlaski, K., Milczarski, P.: Applications of QR codes in secure mobile data exchange. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 277–286. Springer, Cham (2014). doi:10.1007/978-3-319-07941-7_28

    Chapter  Google Scholar 

  2. Milczarski, P., Podlaski, K., Hłobaż, A.: Applications of secure data exchange method using social media to distribute public keys. In: Gaj, P., Kwiecień, A., Stera, P. (eds.) CN 2015. CCIS, vol. 522, pp. 389–399. Springer, Cham (2015). doi:10.1007/978-3-319-19419-6_37

    Chapter  Google Scholar 

  3. Podlaski, K., Hłobaż, A., Milczarski, P.: Secure data exchange based on social networks public key distribution. In: Internet of Things. IoT Infrastructures - Second International Summit, IoT \(360^\circ \) 2015, Rome, Italy, 27–29 October 2015, Revised Selected Papers, Part I, pp. 52–63 (2015)

    Google Scholar 

  4. Rzońca, D.: Cryptoanalysis of HPM14 encryption algorithm. Studia Informatica 36(3), 5–10 (2015)

    Google Scholar 

  5. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. Chapman & Hall/CRC, Boca Raton (2014)

    MATH  Google Scholar 

  6. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996). doi:10.1007/3-540-68697-5_1

    Google Scholar 

  7. Bezzi, M., Capitani, D., di Vimercati, S., Foresti, S., Livraga, G., Paraboschi, S., Samarati, P.: Data Privacy, pp. 157–179. Springer, Berlin (2011)

    MATH  Google Scholar 

  8. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  9. Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions, pp. 19–35. Springer, Berlin (2005)

    Google Scholar 

  10. National Institute of Standards and Technology: Secure Hash Standard (SHS). Technical report, NIST (2008)

    Google Scholar 

  11. Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1, pp. 17–36. Springer, Berlin (2005)

    Google Scholar 

  12. Szydlo, M., Yin, Y.L.: Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing, pp. 99–114. Springer, Berlin (2006)

    Google Scholar 

  13. Rijmen, V., Oswald, E.: Update on SHA-1, pp. 58–71. Springer, Berlin (2005)

    Google Scholar 

  14. Black, J., Rogaway, P., Shrimpton, T., Stam, M.: An analysis of the blockcipher-based hash functions from PGV. J. Cryptology 23, 519–545 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  15. Hłobaż, A.: Security of measurement data transmission - message encryption method with concurrent hash counting. SEP 1, 13–15 (2007)

    Google Scholar 

  16. Hłobaż, A.: Security of measurement data transmission - modifications of the message encryption method along with concurrent hash counting. FSNT NOT 1, 39–42 (2008)

    Google Scholar 

  17. Preneel, B.: Davies-meyer hash function. In: van Tilborg, H.C.A. (ed.) Encyclopedia of Cryptography and Security, p. 136. Springer, Boston (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Hłobaż .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hłobaż, A., Podlaski, K., Milczarski, P. (2017). Enhancements of Encryption Method Used in SDEx. In: Gaj, P., Kwiecień, A., Sawicki, M. (eds) Computer Networks. CN 2017. Communications in Computer and Information Science, vol 718. Springer, Cham. https://doi.org/10.1007/978-3-319-59767-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59767-6_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59766-9

  • Online ISBN: 978-3-319-59767-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics