DOI QR코드

DOI QR Code

ECC based Authentication Scheme for Securing Data Contents over Open Wireless Network Systems

  • Caytiles, Ronnie D. (Department of Multimedia Engineering, Hannam University) ;
  • Park, Byungjoo (Department of Multimedia Engineering, Hannam University)
  • 투고 : 2018.12.09
  • 심사 : 2018.12.21
  • 발행 : 2018.12.31

초록

Multimedia contents have been increasingly available over the Internet as wireless networks systems are continuously growing popular. Unlimited access from various users has led to unauthorized access of third parties or adversaries. This paper deals with the implementation of elliptic curve cryptography (ECC) based user authentication for securing multimedia contents over the Internet. The ECC technique has been incorporated with the advanced encryption standard (AES) algorithm to ensure the complexity of the proposed authentication scheme and to guarantee authenticity of multimedia services.

키워드

과제정보

연구 과제 주관 기관 : Hannam University

참고문헌

  1. M. Bellare and P. Rogaway.(2005, Sept.), "Introduction to Modern Cryptography", Available: http://web.cs.ucdavis.edu/-rogaway/classes/227/spring05/book/main.pdf
  2. P. Gralla, "How the Internet Works", in Indianapolis: Que Pub., 2007, pp. 201-248.
  3. NCCIC, "Understanding Denial-of-Service Attacks", in US-CERT, Feb. 2013.
  4. Z. Ramzan, "Phishing attacks and countermeasures", in Springer Handbook of Information and Communication Security, Germany, 2010, pp. 433-448.
  5. F. Callegati, W. Cerroni, M. Ramilli and Marco, "Man-in-the-Middle Attack to the HTTPS Protocol", IEEE Security and Privacy Magazine, Vol. 7, No. 1, pp. 78-81, Mar. 2009.
  6. D. R. Stinson, "Cryptography: Theory and Practice", Discrete Mathematics and Its Applications, Chapman and Hall/CRC; 3rd edition, November 1, 2005.
  7. W. Diffie and M. Hellman, "New Directions in Cryptography", in IEEE Transactions on Information Theory, Vol. IT-22, pp. 644-654, Nov. 1976.
  8. N. Koblitz, "Elliptic curve cryptosystems", in Mathematics of Computation, American Mathematical Society, Vol. 48, No. 177, pp. 203-209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
  9. V. Miller, "Use of elliptic curves in cryptography", in CRYPTO Lecture Notes in Computer Science, Vol. 85, pp. 417-426, Jan. 1985.
  10. Federal Information Processing Standards Publication 197, "Announcing the ADVANCED ENCRYPTION STANDARD (AES)", in United States National Institute of Standards and Technology (NIST), Nov. 26, 2001.
  11. "ISO/IEC 18033-3: Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers", https://www.iso.org/obp/ui/#iso:std:iso-iec:18033:-3:ed-2:v1:en, Retrieved June 10, 2018.
  12. D. Bhole, A. Mote, and R. Patil, "A New Security Protocol Using Hybrid Cryptography Algorithms", International Journal of Computer Sciences and Engineering, Vol. 4, Special Issue-2, April 2016 E-ISSN: 2347-2693.
  13. G. R. Patel and K. Panchal, "Hybrid Encryption Algorithm", International Journal of Engineering Development and Research, Vol. 2, Issue 2 | ISSN: 2321-9939 (2014).
  14. A. Agrawal and G. Patankar, "Design of Hybrid Cryptography Algorithm for Secure Communication", International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 01 | Jan-2016, e-ISSN: 2395 -0056, p-ISSN: 2395-0072.