Novel Hardware Implementation of the Cipher Message Authentication Code
نویسندگان
چکیده
منابع مشابه
The Security of the Cipher Block Chaining Message Authentication Code
Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) speci es that an m-block message x = x1 xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a pre x of ym, where y0 = 0 l and yi = Fa(mi yi 1) for i = 1; 2; : : : ;m. This method is a pervasively used international and U.S. stan...
متن کاملOn the Security of Cipher Block Chaining Message Authentication Code
In [4], Bernstein presented a simple proof of security of Cipher Block Chaining (CBC) Message Authentication Code (MAC) against adversaries querying messages all of which are of the same length. In this paper we show that Bernstein’s proof can be used to prove security of CBC MAC against adversaries querying non-empty messages that are not prefixes of each other. This implies that “length-prepe...
متن کاملLecture 9: Message Authentication Code
In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...
متن کاملLecture 10: Message Authentication Code
In this lecture, we will study message authentication. This lecture is organized as follows. • First we will review the cryptographic algorithms that we have learned so far, and discuss their limitations in protecting data integrity and supporting message authentication. • Then we will examine the concept and the design of Message Authentication Code (MAC). I. REVIEW In the previous lectures, w...
متن کاملNMACA: A Novel Methodology for Message Authentication Code Algorithms
For objects stored in long-term digital archives, checking the integrity of the information stored is a prime necessity in the field of secure storage systems. Objects in a digital archive may include documents, images, databases, ..., etc. In a long-term archive those objects could be transferred in many various ways. In many cases, users are required to verify the authentication of the archiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Systems, Networks, and Communications
سال: 2008
ISSN: 1687-7381,1687-739X
DOI: 10.1155/2008/923079