Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter

Focusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according...

Full description

Bibliographic Details
Main Authors: Ma Haifeng, Yao Nianmin, Cai Shaobin, Han Qilong
Format: Article
Language:English
Published: SAGE Publishing 2014-12-01
Series:Journal of Algorithms & Computational Technology
Online Access:https://doi.org/10.1260/1748-3018.8.4.421
id doaj-f41256314230435e9ac042f279da80b9
record_format Article
spelling doaj-f41256314230435e9ac042f279da80b92020-11-25T02:48:37ZengSAGE PublishingJournal of Algorithms & Computational Technology1748-30181748-30262014-12-01810.1260/1748-3018.8.4.421Memory Confidentiality and Integrity Protection Method Based on Variable Length CounterMa Haifeng0Yao Nianmin1Cai Shaobin2Han Qilong3 Computer and Information Engineering Institute Heilongjiang Institute of Science and Technology, Harbin, China Computer Science and Technology Institute Harbin Engineering University Harbin, China Computer Science and Technology Institute Harbin Engineering University Harbin, China Computer Science and Technology Institute Harbin Engineering University Harbin, ChinaFocusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according to different accessing frequencies and the counter length can be dynamically adjusted. The analysis and the simulation results indicated that compared with the counter mode encryption, the scheme can decrease memory space overhead and the number of overflow. The proposed scheme can be applied to other schemes of protecting confidentiality and integrity based on counters and can satisfy performance requirements for most applications.https://doi.org/10.1260/1748-3018.8.4.421
collection DOAJ
language English
format Article
sources DOAJ
author Ma Haifeng
Yao Nianmin
Cai Shaobin
Han Qilong
spellingShingle Ma Haifeng
Yao Nianmin
Cai Shaobin
Han Qilong
Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
Journal of Algorithms & Computational Technology
author_facet Ma Haifeng
Yao Nianmin
Cai Shaobin
Han Qilong
author_sort Ma Haifeng
title Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
title_short Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
title_full Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
title_fullStr Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
title_full_unstemmed Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
title_sort memory confidentiality and integrity protection method based on variable length counter
publisher SAGE Publishing
series Journal of Algorithms & Computational Technology
issn 1748-3018
1748-3026
publishDate 2014-12-01
description Focusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according to different accessing frequencies and the counter length can be dynamically adjusted. The analysis and the simulation results indicated that compared with the counter mode encryption, the scheme can decrease memory space overhead and the number of overflow. The proposed scheme can be applied to other schemes of protecting confidentiality and integrity based on counters and can satisfy performance requirements for most applications.
url https://doi.org/10.1260/1748-3018.8.4.421
work_keys_str_mv AT mahaifeng memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter
AT yaonianmin memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter
AT caishaobin memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter
AT hanqilong memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter
_version_ 1724747481149865984