TY - JOUR
T1 - Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network
AU - Hwang, Tzonelih
AU - Gope, Prosanta
N1 - Funding Information:
This work is financially supported by the Ministry of Science and Technology, under contract no. MOST 103-2221-E-006-177. The authors would like to thank the Ministry of Science and Technology, Taiwan, for their benign supports. The authors also would like to thank all the anonymous referees for their valuable suggestions.
Publisher Copyright:
© 2015 John Wiley & Sons, Ltd.
PY - 2016/5/10
Y1 - 2016/5/10
N2 - Authenticated Encryption is a cryptographic process of providing confidentiality and integrity protection of messages in a single pass without any support of conventional checksum, Message Authentication Code (MAC), or hash function. In this paper, at first, we show that how to construct the stream-cipher-based Authenticated Encryption environment, where the key-stream is generated from any secure block algorithm like Advanced Encryption Standard. In order to do that, we introduce two stream-cipher modes of Authenticated Encryption, namely, PFC-CTR (Counter-based Authenticated Encryption environment) and PFC-OCB (OCB-based Authenticated Encryption environment), which are quite robust against several active attacks, for example, message stream modification attacks, known-plain-text attacks, and chosen-plain-text attacks, and at the same time, they can also efficiently deal with some other issues like "limited error propagation" existing in several conventional stream-cipher modes of operation like Cipher Feedback, Output Feedback, and Counter. Finally, we enforce the concept of Authenticated Encryption in the sense of data communication security of the wireless sensor network (WSN), Global Mobility Networks (GLOMONET), and Cloud Computing environment, where only encryption can guarantee both the privacy and integrity in a single pass with the assurance of reasonable computational overhead.
AB - Authenticated Encryption is a cryptographic process of providing confidentiality and integrity protection of messages in a single pass without any support of conventional checksum, Message Authentication Code (MAC), or hash function. In this paper, at first, we show that how to construct the stream-cipher-based Authenticated Encryption environment, where the key-stream is generated from any secure block algorithm like Advanced Encryption Standard. In order to do that, we introduce two stream-cipher modes of Authenticated Encryption, namely, PFC-CTR (Counter-based Authenticated Encryption environment) and PFC-OCB (OCB-based Authenticated Encryption environment), which are quite robust against several active attacks, for example, message stream modification attacks, known-plain-text attacks, and chosen-plain-text attacks, and at the same time, they can also efficiently deal with some other issues like "limited error propagation" existing in several conventional stream-cipher modes of operation like Cipher Feedback, Output Feedback, and Counter. Finally, we enforce the concept of Authenticated Encryption in the sense of data communication security of the wireless sensor network (WSN), Global Mobility Networks (GLOMONET), and Cloud Computing environment, where only encryption can guarantee both the privacy and integrity in a single pass with the assurance of reasonable computational overhead.
UR - http://www.scopus.com/inward/record.url?scp=84947766800&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84947766800&partnerID=8YFLogxK
U2 - 10.1002/sec.1388
DO - 10.1002/sec.1388
M3 - Article
AN - SCOPUS:84947766800
VL - 9
SP - 667
EP - 679
JO - Security and Communication Networks
JF - Security and Communication Networks
SN - 1939-0114
IS - 7
ER -