Secure Data Transmission
Secure Data Transmission
Cryptographic Concepts
Gubberan. R, Research Scholar, Department of Computer Science, Yenepoya
(Deemed to be University), Karnataka, India. Reg No: 24MSCB002,
[email protected]
Dr. Ningthoujam Chidananda Singh, Faculty Head, Department of Computer
Science, Yenepoya (Deemed to be University), Karnataka, India.
[email protected]
Abstract
In the era of the World Wide Web, e-commerce, and social networks, data
security has become a critical concern for organizations worldwide. As the
volume of online transactions and data exchanges grows, so does the risk of cyber
threats. Network security and cryptography play a vital role in protecting
sensitive information from unauthorized access, tampering, and theft. This paper
reviews the current state of network security and cryptographic concepts,
including encryption techniques, hash functions, digital signatures, and key
exchange protocols. The primary focus is on the security concerns of end systems
and entire networks, highlighting the need for robust security measures to prevent
cyber-attacks and data breaches. By examining the latest cryptographic
algorithms and techniques, this paper aims to provide a comprehensive
understanding of the importance of network security and cryptography in the
digital age.
Keywords: Network Security, Cryptography, Decryption, Encryption
Introduction
Internet has become more and more widespread, if an unauthorized
person is able to get access to this network, he can not only spy on us but he can
easily mess up our lives. Network Security & Cryptography is a concept to
protect network and data transmission over wireless network. A network
security system typically relies on layers of protection and consists of multiple
components including networking monitoring and security software in addition
to hardware and appliances. All components work together to increase the
overall security of the computer network. Security of data can be done by a
technique called cryptography. So, one can say that cryptography is an emerging
technology, which is important for network security.
Model for Cryptosystem Using Neural Network supports high security.
Neural network and cryptography together can make a great help in field of
networks security. The key formed by neural network is in the form of weights
and neuronal functions which is difficult to break. Here, content data would be
used as an input data for cryptography so that data become unreadable for
attackers and remains secure from them. The ideas of mutual learning, self-
learning, and stochastic behavior of neural networks and similar algorithms can
be used for different aspects of cryptography, like public-key cryptography,
solving the key distribution problem using neural network mutual
synchronization, hashing or generation of pseudo-random numbers. Another
idea is the ability of a neural network to separate space in non-linear pieces
using "bias". It gives different probabilities of activating or not the neural
network. This is very useful in the case of Cryptanalysis. Network security
consists of the provisions and policies adopted by a network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources. Network security covers a
variety of computer networks, both public and private, that are used in everyday
jobs conducting transactions and communications among businesses,
government agencies and individuals. Networks can be private, such as within a
company, and others which might be open to public access. Network security is
involved in organizations, enterprises, and other types of institutions. It does as
its title explains: It secures the network, as well as protecting and overseeing
operations being done. The most common and simple way of protecting a
network resource is by assigning it a unique name and a corresponding
password Cryptography is the science of writing in secret code. More generally,
it is about constructing and analyzing protocols that block adversaries; various
aspects in information security such as data confidentiality, data integrity,
authentication, and non-repudiation are central to modern cryptography. Modern
cryptography exists at the intersection of the disciplines of mathematics,
computer science, and electrical engineering. Applications of cryptography
include ATM cards, computer passwords, and electronic commerce. The
development of the World Wide Web resulted in broad use of cryptography for e
commerce and business applications. Cryptography is closely related to the
disciplines of cryptology and cryptanalysis. Techniques used for decrypting a
message without any knowledge of the encryption details fall into the area of
cryptanalysis. Cryptanalysis is what the layperson calls “breaking the code.”
The areas of cryptography and cryptanalysis together are called cryptology.
Encryption is the process of converting ordinary information (called plaintext)
into unintelligible text (called ciphertext). Decryption is the reverse, in other
words, moving from the unintelligible ciphertext back to plaintext.
Cryptosystem is the ordered list of elements of finite possible plaintexts, finite
possible cyphertexts, finite possible keys, and the encryption and decryption
algorithms which correspond to each key. The challenging problem is how to
effectively share encrypted data. Encrypt message with strongly secure key
which is known only by sending and recipient end is a significant aspect to
acquire robust security in sensor network. The secure exchange of key between
sender and receiver is too much difficult task in resource constraint sensor
network. data should be encrypted first by users before it is outsourced to a
remote cloud storage service and both data security and data access privacy
should be protected such that cloud storage service providers have no abilities to
decrypt the data, and when the user wants to search some parts of the whole
data, the cloud storage system will provide the accessibility without knowing
what the portion of the encrypted data returned to the user is about. This paper
reviews various network security and cryptographic approaches. In this paper
sections are organized as follows: Section 2 gives the idea about types of
security attacks on cloud. Section 3 deals with security services. Section 4
explains network security model. Section 5 describes the various cryptography
mechanism. Section 6 gives the idea about message authentication. Section 7
shows network and internet related security approach. Firewalls technique is
provided in section 8. Section 9 concludes the paper and presents avenues for
future work. References for this paper are given in section 10.
Types of Security Attacks
1. Passive Attacks
This type of attacks includes observation or monitoring of
communication. A passive attack attempts to learn or make use of information
from the system but does not affect system resources. The goal of the opponent
is to obtain information that is being transmitted.
Types of passive attacks:
a. Traffic Analysis: The message traffic is sent and received in an
apparently normal fashion, and neither the sender nor receiver is
aware that a third party has read the messages or observed the
traffic pattern.
b. Release of Message Contents: Read contents of message from
sender to receiver.
2. Active Attacks
An active attack attempts to alter system resources or affect their
operation. It involves some modification of the data stream or the creation of a
false stream.
Types of active attacks:
a. Modification of Messages: some portion of a legitimate message
is altered, or that messages are delayed or reordered.
b. Denial of Service: An entity may suppress all messages directed to
a particular destination.
c. Replay: It involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.
d. Masquerade: It takes place when one entity pretends to be a
different entity.
Security Services
It is a service that is provided by a protocol layer of communicating open
systems and that ensures adequate security of the systems or of data transfers. It
enhances the security of data processing and transferring.
1. Data Integrity: It can apply to a stream of messages, a single message, or
selected fields within a message. A loss of integrity is the unauthorized
modification or destruction of information.
2. Data Confidentiality: Preserving authorized restrictions on information
access and disclosure, including means for protecting personal privacy
and proprietary information. A loss of confidentiality is the unauthorized
disclosure of information.
3. Authenticity: Provide authentication to all the node and base station for
utilizing the available limited resources. It also ensures that only the
authorized node can participant for the communication.
4. Nonrepudiation: It prevents either sender or receiver from denying a
transmitted message. Thus, when a message is sent, the receiver can
prove that the alleged sender in fact sent the message. Similarly, when a
message is received, the sender can prove that the alleged receiver in fact
received the message.
5. Access Control: To Access control is the ability to limit and control the
access host systems and applications via communications links. To
achieve this, each entity trying to gain access must first be identified, or
authenticated, so that access rights can be tailored to the individual.
Network Security Model
A message is to be transferred from one party to another across some sort
of Internet service. A third party may be responsible for distributing the secret
information to the sender and receiver while keeping it from any opponent.
Security aspects come into play when it is necessary or desirable to protect the
information transmission from an opponent who may present a threat to
confidentiality, authenticity, and so on.
f. KASUMI: A block cipher using a 128-bit key and block size 64-bit, is
part of the Third-Generation Partnership Project (3gpp), formerly known
as the Universal Mobile Telecommunications System (UMTS). KASUMI
is the intended confidentiality and integrity algorithm for both message
content and signaling data for emerging mobile communications systems.
KASUMI is used in the A5/3 key stream generator and in GPRS in the
GEA3 key stream generator. In 2010, Dunkelman, Keller and Shamir
published a new attack that allows an adversary to recover a full A5/3 key
by related-key attack [13]. The core of KASUMI is an eight-round Feistel
network. The round functions in the main Feistel network are irreversible
Feistel-like network transformations. In each round the round function
uses a round key which consists of eight 16-bit sub keys derived from the
original 128-bit key using a fixed key schedule.
2. Public-Key Cryptography
Public-key cryptography is a form of cryptosystem in which encryption
and decryption are performed using the different keys—one a public key and
one a private key. These keys are mathematically related although knowledge of
one key does not allow someone to easily determine the other key. As shown in
Figure 3, the sender A uses the public key of receiver B (or some set of rules) to
encrypt the plaintext message M and sends the ciphertext C to the receiver. The
receiver applies own private key (or ruleset) to decrypt the cipher text C and
recover the plaintext message M. Because pair of keys is required, this approach
is also called asymmetric cryptography. Asymmetric encryption can be used for
confidentiality, authentication, or both. Applications for Public-Key
Cryptosystems are given in Table 1.
Public-key cryptography algorithms that are in use today for key exchange or
digital signatures include:
1) RSA
The first, and still most common, public key cryptography
implementation, named for the three MIT mathematicians who developed it —
Ronald Rivest, Adi Shamir, and Leonard Adleman [14]. RSA today is used in
hundreds of software products and can be used for key exchange, digital
signatures, or encryption of small blocks of data. RSA uses a variable size
encryption block and a variable size key. The key-pair is derived from a very
large number, n, that is the product of two prime numbers chosen according to
special rules; these primes may be 100 or more digits in length each, yielding an
n with roughly twice as many digits as the prime factors.
RSA has three phases:
a) Key Generation
b) Encryption
c) Decryption
a) Key Generation Phase
Receiver generates a public/private key pair. Algorithm is as follow:
1) Select p, q such that p and q both are prime, p ≠ q
2) Calculate n = p * q
3) Calculate f(n) = (p - 1)(q - 1)
4) Select integer e such that gcd(f(n), e) = 1; 1 < e < f(n)
5) Calculate d such that d≡ e-1 (mod f(n))
6) Public key PUK= (e, n)
7) Private key PRK=(d, n)
b) Encryption Phase
Encryption is done by sender with receiver’s Public Key. Algorithm is as
follow:
1) Plain Text M is known, M < n
2) Cipher Text C is calculated as = e C M n mod
c) Decryption Phase
Decryption is done by receiver using his Private Key. Algorithm is as follow:
1) Cipher Text C is known
2) Plain Text M is calculated as = d M C n mod
2. CMAC
Cipher-based message authentication codes (CMACs) are a tool for
calculating message authentication codes using a block cipher coupled with a
secret key. CMAC can be used to verify both the integrity and authenticity of a
message. This mode of operation fixes security deficiencies of CBC-MAC
(CBC-MAC is secure only for fixed-length messages). To generate an ℓ-bit
CMAC tag (t) of a message (m) using a b-bit block cipher (E) and a secret key
(k), one first generates two b-bit sub keys (k1 and k2).
Sub-keys (k1 and k2) Algorithm:
1) Calculate a temporary value k0 = Ek (0).
2) If msb(k0) = 0, then k1 = k0 ≪ 1, else k1 = (k0 ≪ 1) ⊕ C;
where C is a certain constant that depends only on b. (Specifically,
C is the non-leading coefficients of the lexicographically first
irreducible degree-b binary polynomial with the minimal number
of ones.)
3) If msb(k1) = 0, then k2 = k1 ≪ 1, else k2 = (k1 ≪ 1) ⊕ C.
4) Return keys (k1, k2) for the MAC generation process.
CMAC Tag Generation Algorithm:
1) Divide message into b-bit blocks m = m1 ∥ … ∥ mn−1 ∥ mn′
where m1, …, mn−1 are complete blocks. (The empty message is
treated as 1 incomplete block.)
2) If mn′ is a complete block then mn = k1 ⊕ mn′ else mn = k2 ⊕
(mn′∥ 10…02).
3) Let c0 = 00…02.
4) For i = 1,…, n, calculate ci = Ek(ci−1 ⊕ mi).
5) Output t = msbℓ(cn).
Network and Internet Security
Internet security is a tree branch of computer security specifically related
to the Internet, often involving browser security but also network security on a
more general level as it applies to other applications or operating systems on a
whole. Its objective is to establish rules and measures to use against attacks over
the Internet. The Internet represents an insecure channel for exchanging
information leading to a high risk of intrusion or fraud, such as phishing.
Different methods have been used to protect the transfer of data, including
encryption.
Network security involves the authorization of access to data in a
network, which is controlled by the network administrator. Users choose or are
assigned an ID and password or other authenticating information that allows
them access to information and programs within their authority.
Types of Network Security:
1. Wireless Network Security
Wireless security is the prevention of unauthorized access or damage to
computers using wireless networks. The most common types of wireless
security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access
(WPA). WEP is a notoriously weak security standard. The password it uses can
often be cracked in a few minutes with a basic laptop computer and widely
available software tools. WAP security is primarily provided by the Wireless
Transport Layer Security (WTLS), which provides security services between the
mobile device (client) and the WAP gateway to the Internet. There are several
approaches to WAP end-to-end security. One notable approach assumes that the
mobile device implements TLS over TCP/IP and the wireless network supports
transfer of IP packets. The WAP architecture is designed to cope with the two
principal limitations of wireless Web access: the limitations of the mobile node
(small screen size, limited input capability) and the low data rates of wireless
digital networks. Two important WTLS concepts are the secure session and the
secure connection, which are defined in the specification as:
1) Secure connection: A connection is a transport (in the OSI layering
model definition) that provides a suitable type of service. For SSL, such
connections are peer-to-peer relationships. The connections are transient.
Every connection is associated with one session. Between any pair of
parties (applications such as HTTP on client and server), there may be
multiple secure connections. In theory, there may also be multiple
simultaneous sessions between parties, but this feature is not used in
practice.
2) Secure session: An SSL session is an association between a client and
a server. Sessions are created by the Handshake Protocol. Sessions define
a set of cryptographic security parameters, which can be shared among
multiple connections. Sessions are used to avoid the expensive
negotiation of new security parameters for each connection. There are a
number of states associated with each session. Once a session is
established, there is a current operating state for both read and write (i.e.,
receive and send). In addition, during the Handshake Protocol, pending
read and write states are created. Upon successful conclusion of the
Handshake Protocol, the pending states become the current states.
2. IP Security
Internet Protocol Security (IPsec) is a protocol suite for securing Internet
Protocol (IP) communications by authenticating and encrypting each IP packet
of a communication session. IPsec includes protocols for establishing mutual
authentication between agents at the beginning of the session and negotiation of
cryptographic keys to be used during the session. IPsec can be used in
protecting data flows between a pair of hosts (host-to host), between a pair of
security gateways (network-to network), or between a security gateway and a
host (network-to-host). IPsec is said to be especially useful for implementing
virtual private networks and for remote user access through dial-up connection
to private networks. A big advantage of IPsec is that security arrangements can
be handled without requiring changes to individual user computers.
IPsec provides two choices of security service: Authentication Header
(AH), which essentially allows authentication of the sender of data, and
Encapsulating Security Payload (ESP), which supports both authentication of
the sender and encryption of data as well. The specific information associated
with each of these services is inserted into the packet in a header that follows
the IP packet header. Separate key protocols can be selected, such as the
ISAKMP/Oakley protocol. IPsec uses cryptographic security services to protect
communications over Internet Protocol (IP) networks. IPsec supports network-
level peer authentication, authentication, data integrity, data data origin
confidentiality (encryption), and replay protection. IPsec protects any
application traffic over an IP network. Applications can be automatically
secured by IPsec at the IP layer.
Modes of Operation
IPsec can be implemented in a host-to-host transport mode, as well as in a
network tunneling mode.
In transport mode, only the payload of the IP packet is usually encrypted
and/or authenticated. The routing is intact, since the IP header is neither
modified nor encrypted; however, when the authentication header is used, the IP
addresses cannot be translated, as this will invalidate the hash value. The
transport and application layers are always secured by hash, so they cannot be
modified in any way (for example by translating the port numbers).
In tunnel mode, the entire IP packet is encrypted and/or authenticated. It
is then encapsulated into a new IP packet with a new IP header. Tunnel mode is
used to create virtual private networks for network-to-network communications
(e.g. between routers to link sites), host to-network communications (e.g.
remote user access) and host-to-host communications (e.g. private chat).
3. Electronic Mail Security
Email is vulnerable to both passive and active attacks. The protection of
email from unauthorized access and inspection is known as electronic privacy.
In countries with a constitutional guarantee of the secrecy of correspondence,
email is equated with letters and thus legally protected from all forms of
eavesdropping. With the explosively growing reliance on e-mail, there grows a
demand for authentication and confidentiality services. Two schemes stand out
as approaches that enjoy widespread use: Pretty Good Privacy (PGP) and
Secure/Multipurpose Internet Mail Extension S/MIME.
PGP is an open-source, freely available software package for e-mail
security. It provides authentication through the use of digital signature,
confidentiality through the use of symmetric block encryption, compression
using the ZIP algorithm, and e-mail compatibility using the radix-64 encoding
scheme. PGP incorporates tools for developing a public-key trust model and
public-key certificate management.
S/MIME is an Internet standard approach to e-mail security that
incorporates the same functionality as PGP. It is a security enhancement to the
MIME Internet e-mail format standard based on technology from RSA Data
Security.
4. Transport-Level Security
Transport-Level Security (TLS) is an IETF standardization initiative
whose goal is to produce an Internet standard version of SSL. Secure Socket
Layer (SSL) provides security services between TCP and applications that use
TCP. The Internet standard version is called Transport Layer Service (TLS). The
TLS Record Format is the same as that of the SSL Record Format. SSL/TLS
provides confidentiality using symmetric encryption and message integrity
using a message authentication code. SSL/TLS includes protocol mechanisms to
enable two TCP users to determine the security mechanisms and services they
will use. HTTPS (HTTP over SSL) refers to the combination of HTTP and SSL
to implement secure communication between a Web browser and a Web server.
Secure Shell (SSH) provides secure remote logon and other secure client/server
facilities. The SSH Connection Protocol runs on top of the SSH Transport Layer
Protocol and assumes that a secure authentication connection is in use. All types
of communication using SSH, such as a terminal session, are supported using
separate channels.
Firewalls
A firewall forms a barrier through which the traffic going in each
direction must pass. A firewall security policy dictates which traffic is
authorized to pass in each direction. Firewalls impose restrictions on incoming
and outgoing Network packets to and from private networks. Incoming or
outgoing traffic must pass through the firewall; only authorized traffic is
allowed to pass through it. Firewalls create checkpoints between an internal
private network and the public Internet, also known as choke points(borrowed
from the identical military term of a combat limiting geographical feature).
Firewalls can create choke points based on IP source and TCP port number.
They can also serve as the platform for IPsec. Using tunnel mode capability,
firewall can be used to implement VPNs. Firewalls can also limit network
exposure by hiding the internal network system and information from the public
Internet. A firewall may be designed to operate as a filter at the level of IP
packets, or may operate at a higher protocol layer.
1. Characteristics of Firewalls
Firewalls can be an effective means of protecting a local system or
network of systems from network-based security threats while at the same time
affording access to the outside world via wide area networks and the Internet. It
includes following characteristics:
• All traffic from inside to outside, and vice versa, must pass through the
firewall. This is achieved by physically blocking all access to the local
network except via the firewall.
• Only authorized traffic, as defined by the local security policy, will be
allowed to pass. Various types of firewalls are used, which implement
various types of security policies.
• The firewall itself is immune to penetration. This implies the use of a
hardened system with a secured operating system. Trusted computer
systems are suitable for hosting a firewall and often required in
government applications.
2. Types of Firewalls
A firewall may act as a packet filter. It can operate as a positive filter,
allowing to pass only packets that meet specific criteria, or as a negative filter,
rejecting any packet that meets certain criteria. Depending on the type of
firewall, it may examine one or more protocol headers in each packet, the
payload of each packet, or the pattern generated by a sequence of packets. Types
of firewalls are shown in Figure 8.
1. Packet Filter
• A packet filter is a first-generation firewall that processes network
traffic on a packet-by-packet basis. Its main job is to filter traffic from
a remote IP host, so a router is needed to connect the internal network
to the Internet.
• The router is known as a screening router, which screens packets
leaving and entering the network. Because packet filter firewalls do
not examine upper-layer data, they cannot prevent attacks that employ
application specific vulnerabilities or functions.
• For example, a packet filter firewall cannot block specific application
commands; if a packet filter firewall allows a given application, all
functions available within that application will be permitted.
• Packet filter firewalls are generally vulnerable to attacks and exploits
that take advantage of problems within the TCP/IP specification and
protocol stack, such as network layer address spoofing.
• Many packet filter firewalls cannot detect a network packet in which
the OSI Layer 3 addressing information has been altered. Spoofing
attacks are generally employed by intruders to bypass the security
controls implemented in a firewall platform.
3. Application-Level Gateway
• An application-level firewall is a third-generation firewall where a
proxy server operates at the very top of the OSI model, the IP suite
application level. It is also known as application proxy. The user
contacts the gateway using a TCP/IP application, such as Telnet or
FTP, and the gateway asks the user for the name of the remote host to
be accessed.
• When the user responds and provides a valid user ID and
authentication information, the gateway contacts the application on the
remote host and relays TCP segments containing the application data
between the two endpoints. If the gateway does not implement the
proxy code for a specific application, the service is not supported and
cannot be forwarded across the firewall.
• A network packet is forwarded only if a connection is established
using a known protocol. Application-level gateways are notable for
analysing entire messages rather than individual packets of data when
the data are being sent or received.
Figure 8. Types of Firewalls
Conclusion
With the explosive growth in the Internet, network and data security have
become an inevitable concern for any organization whose internal private
network is connected to the Internet. The security for the data has become
highly important. User’s data privacy is a central question over cloud. With
more mathematical tools, cryptographic schemes are getting more versatile and
often involve multiple keys for a single application.
The paper presented various schemes which are used in cryptography for
Network security purpose. Encrypt message with strongly secure key which is
known only by sending and recipient end, is a significant aspect to acquire
robust security in cloud. The secure exchange of key between sender and
receiver is an important task.
The key management helps to maintain confidentiality of secret
information from unauthorized users. It can also check the integrity of the
exchanged message to verify the authenticity. Network security covers the use
of cryptographic algorithms in network protocols and network applications.
This paper briefly introduces the concept of computer security, focuses on the
threats of computer network security
References
1. Shyam Nandan Kumar, “Technique for Security of Multimedia using
Neural Network,” Paper id-IJRETM-2014-02-05-020, IJRETM, Vol: 02,
Issue: 05, pp.1-7. Sep-2014
2. Simmonds, A; Sandilands, P; van Ekert, L (2004). "An Ontology for
Network Security Attacks". Lecture Notes in Computer Science. Lecture
Notes in Computer Science 3285: 317-323.
3. Bellare, Mihir; Rogaway, Phillip (21 September 2005). "Introduction".
Introduction to Modern Cryptography. p. 10.
4. Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. “A. Handbook of
Applied Cryptography”. ISBN 0-8493-8523-7.
5. Davis, R., “The Data Encryption Standard in Perspective,” Proceeding of
Communication Society magazine, IEEE, Volume 16 No 6, pp. 5-6, Nov.
1978.
6. S. NIST Special Publication 800-67, Recommendation for the Triple Data
Encryption Algorithm (TDEA) Block Cipher, May 2004.
7. Daemen, J., and Rijmen, V. "Rijndael: AES-The Advanced Encryption
Standard, Springer, Heidelberg, March 2001.
8. FIPS 197, Advanced Encryption Standard, Federal Information
Processing Standard, NIST, U.S. Dept. of Commerce, November 26,
2001.
9. Bruce Schneier (1993). "Description of a New Variable-Length Key, 64-
Bit Block Cipher (Blowfish)". Fast Software Encryption, Cambridge
Security Workshop Proceedings (Springer-Verlag): 191-204.
10.Schneier, Bruce (2005-11-23). "Twofish Cryptanalysis Rumors". Schneier
on Security blog. Retrieved 2013-01-14.
11.Matsui, Mitsuru; Tokita, Toshio (Dec 2000). "MISTY, KASUMI and
Camellia Cipher Algorithm Development". Mitsibishi Electric Advance
(Mitsibishi Electric corp.) 100: 2-8. ISSN 1345-3041.
12.General Report on the Design, Speification and Evaluation of 3GPP
Standard Confidentiality and Integrity Algorithms". 3GPP. 2009
13.O. Dunkelman, N. Keller, A. Shamir, \A practical-time attack on the
KASUMI cryptosystem used in GSM and 3G telephony," Advances in
Cryptology, Proceedings Crypto'10, LNCS, T. Rabin, Ed., Springer,
Heidelberg, 2010
14.R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems,” Communication of the ACM,
Volume 21 No. 2, Feb. 1978.
15.Diffie, W.; Hellman, M. (1976). "New directions in cryptography". IEEE
Transactions on Information Theory 22 (6): 644-654.
16.Koblitz, N., 1987. “Elliptic curve cryptosystems. Mathematics of
Computation” 48, 203-209.
17.Miller, V., 1985. “Use of elliptic curves in cryptography”. CRYPTO 85.
18.FIPS 180, Secure Hash Standard, Federal Information Processing
Standard (FIPS), Publication 180, NIST, U.S. Dept. of Commerce, May
11, 1993.
19.M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, M. Schl a er,
\Rebound distinguishers: results on the full Whirlpool compression
function," Advances in Cryptology, Proceedings Asiacrypt'09, LNCS
5912, M. Matsui, Ed., Springer, Heidelberg, 2009, pp. 126-143.
20.Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). "Keying Hash
Functions for Message Authentication".
21.NIST Special Publication 800-38B, “Recommendation for Block Cipher
Modes of Operation”: The CMAC Mode for Authentication, May 2005.