Memory Confidentiality and Integrity Protection Method Based on Variable Length Counter

Haifeng Ma,Nianmin Yao,Shaobin Cai,Qilong Han

Published 2012 in 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science

ABSTRACT

Focusing on the problem of high overhead and frequent overflow of the counter mode encryption, this paper proposed an efficient scheme to protect data confidentiality and integrity. Based on the local characteristic of data accessing, the scheme set different counter length for memory area according to different accessing frequencies and the counter length can be dynamically adjusted. The analysis and the simulation results indicated that compared with the counter mode encryption, the scheme can decrease memory space overhead and the number of overflow. The proposed scheme can be applied to other schemes of protecting confidentiality and integrity based on counters and can satisfy performance requirements for most applications.

PUBLICATION RECORD

  • Publication year

    2012

  • Venue

    2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science

  • Publication date

    2012-10-19

  • Fields of study

    Computer Science

  • Identifiers
  • External record

    Open on Semantic Scholar

  • Source metadata

    Semantic Scholar

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-19 of 19 references · Page 1 of 1

CITED BY