Unconditionally secure chaffing and winnowing with short authentication tags

نویسنده

  • Douglas R. Stinson
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Header hopping and packet mixers

We describe a steganographic protocol for packet switched networks that is based on the dynamic rewriting of packet headers. The protocol provides confidentiality without encryption based on Rivest’s “chaffing and winnowing” technique. We identify new places in computer networks where this method can be applied and describe an alternate chaffing method that relies on unpredictable number sequen...

متن کامل

The Security of Chaffing and Winnowing

This paper takes a closer look at Rivest’s chaffing-and-winnowing paradigm for data privacy. We begin with a definition which enables one to clearly determine whether a given scheme qualifies as “chaffing-and-winnowing.” We then analyze Rivest’s schemes to see what quality of data privacy they provide. His bit-by-bit scheme is easily proven secure but is inefficient. His more efficient scheme —...

متن کامل

Chaffinch: Confidentiality in the Face of Legal Threats

We present the design and rationale of a practical system for passing confidential messages. The mechanism is an adaptation of Rivest’s “chaffing and winnowing”, which has the legal advantage of using authentication keys to provide privacy. We identify a weakness in Rivest’s particular choice of his “package transform” as an “all-or-nothing” element within his scheme. We extend the basic system...

متن کامل

Securing low-cost RFID systems: An unconditionally secure approach

In this paper, we explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authentication and random number generation. For parties equipped with a good source of randomness and a secure cryptographic primitive to authenticate messages, the literature of cryptography is rich with wellstu...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Adv. in Math. of Comm.

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2006