Skip to main content
Top

2020 | OriginalPaper | Chapter

3. Cryptography Concepts: Integrity, Authentication, Availability, Access Control, and Non-repudiation

Author : Khaled Salah Mohamed

Published in: New Frontiers in Cryptography

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To validate the integrity of the data transmitted over the channel, message authentication code (MAC) is used for checking the messages and the authentication, ensuring that the integrity of the information has not been modified under the transmission.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference J. Kelsey, SHA3, Past, Present, and Future (CHES, 2013) J. Kelsey, SHA3, Past, Present, and Future (CHES, 2013)
2.
go back to reference M.J. Dworkin, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Federal Inf. Process, STDS, (NIST FIPS) – 202, (2015) M.J. Dworkin, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Federal Inf. Process, STDS, (NIST FIPS) – 202, (2015)
3.
go back to reference Menezes, van Oorschot, Vanstone, Handbook of Applied Cryptography, Chapter 9, (2001) Menezes, van Oorschot, Vanstone, Handbook of Applied Cryptography, Chapter 9, (2001)
4.
go back to reference J. Katz, Y. Lindell, Introduction to Modern Cryptography (Chapman and Hall/CRC Press, 2007), p. 134, (construction 4.13), J. Katz, Y. Lindell, Introduction to Modern Cryptography (Chapman and Hall/CRC Press, 2007), p. 134, (construction 4.13),
5.
go back to reference M. Nandi, S. Paul, Speeding up the widepipe: secure and fast hashing, in Indocrypt 2010, ed. by G. Gong, K. Gupta, (Springer, 2010) M. Nandi, S. Paul, Speeding up the widepipe: secure and fast hashing, in Indocrypt 2010, ed. by G. Gong, K. Gupta, (Springer, 2010)
6.
go back to reference G. Bertoni, J. Daemen, M. Peeters, A. Gilles Van, On the Indifferentiability of the Sponge Construction (EuroCrypt, 2008) G. Bertoni, J. Daemen, M. Peeters, A. Gilles Van, On the Indifferentiability of the Sponge Construction (EuroCrypt, 2008)
7.
go back to reference [HMAC-SHA], D. Eastlake, T. Hansen, US Secure Hash Algorithms (SHA and MAC-SHA) (RFC 4634, 2006) [HMAC-SHA], D. Eastlake, T. Hansen, US Secure Hash Algorithms (SHA and MAC-SHA) (RFC 4634, 2006)
8.
go back to reference National Institute of Standards and Technology, Secure Hash Standard (SHS), Federal Information processing Standards Publication 180-1, 17 April 1995 National Institute of Standards and Technology, Secure Hash Standard (SHS), Federal Information processing Standards Publication 180-1, 17 April 1995
9.
go back to reference National Institute of Standards and Technology, The Keyed-Hash Message Authentication Code (HMAC) Federal Information processing Standards Publication 198, 6 March 2002 National Institute of Standards and Technology, The Keyed-Hash Message Authentication Code (HMAC) Federal Information processing Standards Publication 198, 6 March 2002
13.
go back to reference S.J. Nanda, G. Panda, B. Mekhi, Improved identification of nonlinear dynamic systems using artificial immune system, in IEEE International Conference on Control, Communication and Automation (INDICON-08), (IIT Kanpur, 2008), pp. 268–273 S.J. Nanda, G. Panda, B. Mekhi, Improved identification of nonlinear dynamic systems using artificial immune system, in IEEE International Conference on Control, Communication and Automation (INDICON-08), (IIT Kanpur, 2008), pp. 268–273
14.
go back to reference S. Forrest, S. Hofmeyr, A. Somayaji, T.A. Longstaff, A sense of self for Unix processes, in Proceedings of the IEEE Symposium on Computer Security and Privacy, (1996), pp. 120–128 S. Forrest, S. Hofmeyr, A. Somayaji, T.A. Longstaff, A sense of self for Unix processes, in Proceedings of the IEEE Symposium on Computer Security and Privacy, (1996), pp. 120–128
15.
go back to reference A. Somayaji, S. Hofmeyr, S. Forrest, Principle of a computer immune system, in Proceeding of the Second New Security Paradigms Workshop, (1997), pp. 75–82 A. Somayaji, S. Hofmeyr, S. Forrest, Principle of a computer immune system, in Proceeding of the Second New Security Paradigms Workshop, (1997), pp. 75–82
16.
go back to reference S. Hofmeyr, S. Forrest, A. Somayaji, Intusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)CrossRef S. Hofmeyr, S. Forrest, A. Somayaji, Intusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)CrossRef
17.
go back to reference U. Aickelin, J. Greensmith, J. Twycross, Immune system approaches to intrusion detection – A review, in Proceeding of the Third International Conference on Artificial Immune Systems, ICARIS-04, (2004), pp. 316–329 U. Aickelin, J. Greensmith, J. Twycross, Immune system approaches to intrusion detection – A review, in Proceeding of the Third International Conference on Artificial Immune Systems, ICARIS-04, (2004), pp. 316–329
18.
go back to reference L.N. de Charsto, J.V. Zuben, Learning and optimization using clonal selection principle. IEEE Trans Evol. Comput. Spec. Issue Artific. Immun. Syst. 6(3), 239–251 (2002) L.N. de Charsto, J.V. Zuben, Learning and optimization using clonal selection principle. IEEE Trans Evol. Comput. Spec. Issue Artific. Immun. Syst. 6(3), 239–251 (2002)
19.
go back to reference L.N. de Charsto, J. Timmis, An artificial immune network for multimodal function optimization, in IEEE Congress on Evolutionary Computation (CEC’02), vol. 1, (Hawaii, 2002), pp. 699–674 L.N. de Charsto, J. Timmis, An artificial immune network for multimodal function optimization, in IEEE Congress on Evolutionary Computation (CEC’02), vol. 1, (Hawaii, 2002), pp. 699–674
20.
go back to reference A.B. Watkins, Exploiting Immunological Metaphors in the Development of Serial, Parallel, and Distributed Learning Algorithms, (Ph. D thesis, University of Kent, 2005) A.B. Watkins, Exploiting Immunological Metaphors in the Development of Serial, Parallel, and Distributed Learning Algorithms, (Ph. D thesis, University of Kent, 2005)
21.
go back to reference P.K. Harmer, P.D. Williams, G.H. Gunsch, G.B. Lamont, An artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 6(3), 252–280 (2002)CrossRef P.K. Harmer, P.D. Williams, G.H. Gunsch, G.B. Lamont, An artificial immune system architecture for computer security applications. IEEE Trans. Evol. Comput. 6(3), 252–280 (2002)CrossRef
22.
go back to reference Z. Zhang, T. Xin, Immune algorithm with adaptive sampling in noisy environments and its application to stochastic optimization problems. IEEE Comput. Intell. Mag., 29–40 (2007) Z. Zhang, T. Xin, Immune algorithm with adaptive sampling in noisy environments and its application to stochastic optimization problems. IEEE Comput. Intell. Mag., 29–40 (2007)
23.
go back to reference M. Drozda, S. Schaust, H. Szczerbicka, AIS for misbehavior detection in wireless sensor networks: Performance and design principles. IEEE Cong. Evol. Comput. (CEC’07), 3719–3726 (2007) M. Drozda, S. Schaust, H. Szczerbicka, AIS for misbehavior detection in wireless sensor networks: Performance and design principles. IEEE Cong. Evol. Comput. (CEC’07), 3719–3726 (2007)
24.
go back to reference H.-W. Ge, L. Sun, Y.C. Liang, F. Qian, An effective PSO and AIS-based hybrid intelligent algorithm for job shop scheduling. IEEE Trans. Syst. Man Cybern. A 38(2), 358–368 (2008)CrossRef H.-W. Ge, L. Sun, Y.C. Liang, F. Qian, An effective PSO and AIS-based hybrid intelligent algorithm for job shop scheduling. IEEE Trans. Syst. Man Cybern. A 38(2), 358–368 (2008)CrossRef
25.
go back to reference S. Cayzer, U. Aickelin, A recommender system based on Idiotypic artificial immune networks. J. Math. Modell. Algor. 4(2), 181–198 (2005)CrossRef S. Cayzer, U. Aickelin, A recommender system based on Idiotypic artificial immune networks. J. Math. Modell. Algor. 4(2), 181–198 (2005)CrossRef
26.
go back to reference Q. Chen, U. Aickelin, Movie recommendation systems using an artificial immune system, in Proceedings of ACDM −04, (Bristol, UK, 2004) Q. Chen, U. Aickelin, Movie recommendation systems using an artificial immune system, in Proceedings of ACDM −04, (Bristol, UK, 2004)
27.
go back to reference E. Alizadeh, N. Meskin, K. Khorasani, A negative selection immune system inspired methodology for fault diagnosis of wind turbines. IEEE Trans. Cybernet. 47(11) (2017) E. Alizadeh, N. Meskin, K. Khorasani, A negative selection immune system inspired methodology for fault diagnosis of wind turbines. IEEE Trans. Cybernet. 47(11) (2017)
28.
go back to reference D. Dasgupta, Advances in artificial immune systems. IEEE Comput. Intell. Mag. 1(4), 40–49 (2006)CrossRef D. Dasgupta, Advances in artificial immune systems. IEEE Comput. Intell. Mag. 1(4), 40–49 (2006)CrossRef
29.
go back to reference W. Zhang, G.G. Yen, Z. He, Constrained optimization via artificial immune system. IEEE Trans. Cybern. 44(2), 185–198 (2014)CrossRef W. Zhang, G.G. Yen, Z. He, Constrained optimization via artificial immune system. IEEE Trans. Cybern. 44(2), 185–198 (2014)CrossRef
30.
go back to reference Y. Ding, An immune system-inspired reconfigurable controller. IEEE Trans. Control Syst. Technol. 24(5) (2016) Y. Ding, An immune system-inspired reconfigurable controller. IEEE Trans. Control Syst. Technol. 24(5) (2016)
31.
go back to reference K.S. Mohamed, Machine Learning for Model Order Reduction, vol 664 (Springer, 2018) K.S. Mohamed, Machine Learning for Model Order Reduction, vol 664 (Springer, 2018)
Metadata
Title
Cryptography Concepts: Integrity, Authentication, Availability, Access Control, and Non-repudiation
Author
Khaled Salah Mohamed
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-58996-7_3