z-logo
open-access-imgOpen Access
Comparative Study of RKC and GCM Mode of Operation
Author(s) -
Puneet KumarKaushal,
Rajeev Sobti,
Ranjana Singh Rathore
Publication year - 2012
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/8232-1323
Subject(s) - computer science , gcm transcription factors , mode (computer interface) , operations research , human–computer interaction , general circulation model , climate change , geology , mathematics , oceanography
In the race of designing an efficient ‘Authenticated Encryption (AE) mode of operation’ several efforts have been done over past few years. In practical, when we have to send any data, we also need integrity and authentication along with the encrypted message. These requirements in real world prioritize Authenticated Encryption, in spite of using encryption and authentication schemes separately. In an AE scheme the parts responsible for authentication and privacy are tightly coupled so that they can work efficiently. The other reason for using AE scheme is that an AE scheme is less likely to be used incorrectly than the combination of two different schemes. In this paper comparative study of two prominent Authenticated Encryption modes (RKC and GCM) is done that are free from any intellectual property claims. General Terms Security, Authenticated Encryption modes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom