Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
نویسندگان
چکیده
منابع مشابه
FAMIC – Fast Authentication and Message Integrity Check
Recent benchmarking results suggest that the use of asymmetric cryptography for identity management in vehicular networks can introduce significant end-to-end delay, due to the limited processing power of vehicular platforms and complexity of asymmetric crypto operations. This could result in non-timely delivery of critical messages, even in cases when network capacity and connectivity are not ...
متن کاملMessage Authentication over Noisy Channels
The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily inves...
متن کاملCritical Message Integrity Over A Shared Network
Cost and efficiency concerns can force distributed embedded systems to use a single network for both critical and non-critical messages. Such designs must protect against masquerading faults caused by defects in and failures of non-critical network processes. Cyclic Redundancy Codes (CRCs) offer protection against random bit errors caused by environmental interference and some hardware faults, ...
متن کاملReasoning about Message Integrity
We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...
متن کاملAggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender. We suggest aggregate MACs as an appropriate tool for au...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2008
ISSN: 1545-5971
DOI: 10.1109/tdsc.2008.11