Professional Documents
Culture Documents
Constrained Environments
PROJECT BY,
Baskaran.B(31606104005)
Jeyakumar.J(31606104015)
Ramanathan.K(31606104037)
ABSTRACT
Slow process.
PROPOSED SYSTEM
timing modification
source repudiation
destination repudiation
MODULES
SymetricEncryption and Decryption
Key Generation
Hmac Verification
Message Authentication
message authentication is concerned with:
– protecting the integrity of a message
– validating identity of originator
– non-repudiation of origin (dispute resolution)
MAC = CK(M)
Assurances:
– Message has not been altered
– Message is from alleged sender
– Message sequence is unaltered
Message Authentication Code
HMAC
HMAC is a MAC derived from a
cryptographically safe hash-function.
Hardware Requirement:
System : Pentium IV
Hard Disk : 40 GB
RAM : 128 MB
Software Requirement: