Secure Implementation of Message Digest, Authentication and Digital Signature

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical and Secure Message Authentication

Use of encryption algorithms in message authentication is replaced by secure hash functions which are often faster than encryption algorithms. Tsudik 14] has proposed three methods on message authentication which are only based on one-way hash functions and use some keys to make them secure. In this paper, we give a set of practical methods, each of which uses a fast collision free hash functio...

متن کامل

A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks

We present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages) cannot later forge the sign...

متن کامل

Quantum-Secure Message Authentication Codes

We construct the first Message Authentication Codes (MACs) that are existentially unforgeable against a quantum chosen message attack. These chosen message attacks model a quantum adversary’s ability to obtain the MAC on a superposition of messages of its choice. We begin by showing that a quantum secure PRF is sufficient for constructing a quantum secure MAC, a fact that is considerably harder...

متن کامل

UMAC: Fast and Secure Message Authentication

We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current practice (e.g., HMAC-SHA1), and about twice as fast as times previously reported for the universal hash-function family MMH. To achieve such speeds, UMAC uses a new universal hash-function family, NH, and a design which a...

متن کامل

Secure Authentication Using Certificate Revocation List (Crl) and Message Signature in Vanet

A vehicular ad hoc network (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to received message. In this paper, secure hash authentication protocol (SHAP) verifie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology Journal

سال: 2005

ISSN: 1812-5638

DOI: 10.3923/itj.2005.204.221