Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter
Focusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2014-12-01
|
Series: | Journal of Algorithms & Computational Technology |
Online Access: | https://doi.org/10.1260/1748-3018.8.4.421 |
id |
doaj-f41256314230435e9ac042f279da80b9 |
---|---|
record_format |
Article |
spelling |
doaj-f41256314230435e9ac042f279da80b92020-11-25T02:48:37ZengSAGE PublishingJournal of Algorithms & Computational Technology1748-30181748-30262014-12-01810.1260/1748-3018.8.4.421Memory Confidentiality and Integrity Protection Method Based on Variable Length CounterMa Haifeng0Yao Nianmin1Cai Shaobin2Han Qilong3 Computer and Information Engineering Institute Heilongjiang Institute of Science and Technology, Harbin, China Computer Science and Technology Institute Harbin Engineering University Harbin, China Computer Science and Technology Institute Harbin Engineering University Harbin, China Computer Science and Technology Institute Harbin Engineering University Harbin, ChinaFocusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according to different accessing frequencies and the counter length can be dynamically adjusted. The analysis and the simulation results indicated that compared with the counter mode encryption, the scheme can decrease memory space overhead and the number of overflow. The proposed scheme can be applied to other schemes of protecting confidentiality and integrity based on counters and can satisfy performance requirements for most applications.https://doi.org/10.1260/1748-3018.8.4.421 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ma Haifeng Yao Nianmin Cai Shaobin Han Qilong |
spellingShingle |
Ma Haifeng Yao Nianmin Cai Shaobin Han Qilong Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter Journal of Algorithms & Computational Technology |
author_facet |
Ma Haifeng Yao Nianmin Cai Shaobin Han Qilong |
author_sort |
Ma Haifeng |
title |
Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter |
title_short |
Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter |
title_full |
Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter |
title_fullStr |
Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter |
title_full_unstemmed |
Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter |
title_sort |
memory confidentiality and integrity protection method based on variable length counter |
publisher |
SAGE Publishing |
series |
Journal of Algorithms & Computational Technology |
issn |
1748-3018 1748-3026 |
publishDate |
2014-12-01 |
description |
Focusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according to different accessing frequencies and the counter length can be dynamically adjusted. The analysis and the simulation results indicated that compared with the counter mode encryption, the scheme can decrease memory space overhead and the number of overflow. The proposed scheme can be applied to other schemes of protecting confidentiality and integrity based on counters and can satisfy performance requirements for most applications. |
url |
https://doi.org/10.1260/1748-3018.8.4.421 |
work_keys_str_mv |
AT mahaifeng memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter AT yaonianmin memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter AT caishaobin memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter AT hanqilong memoryconfidentialityandintegrityprotectionmethodbasedonvariablelengthcounter |
_version_ |
1724747481149865984 |