Abstract: In this survey, we endorse new techniques for authenticate the short encrypted messages which can be fulfill the requirements of pervasive applications. With the help of these advantage that the message to be authenticated must also be encrypted, we suggest provably secure authentication codes which can be greater efficient than any message authentication code there are used an inside the literature. The key point of this concept at the back of the proposed techniques is to use the security that help the encryption algorithm would provide to implements the more efficient authentication mechanisms, as opposed to use standalone authentication primitives.
Keywords: Authentication, unconditional security, computational security, universal hash-function families, pervasive computing.