BMAC IS INSECURE Page 1 AUTHENTICATING MULTI-CAST INTERNET ELECTRONIC MAIL MESSAGES USING A BIDIRECTIONAL MAC IS INSECURE

نویسنده

  • Chris J. Mitchell
چکیده

The 1988 version of the message encryption and authentication procedures for Internet electronic mail makes use of a 'Bidirectional MAC' or BMAC. When used for multi-cast electronic mail it is important that this BMAC acts as a one-way function. We show here that it is not a one-way function, which means that the BMAC technique should not be used for authenticating multi-cast messages.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Electronic Commerce

Such trade does, however, take place on an insecure environment (the Internet), in which communication partners may cheat, and in which other parties may do harm. Table 1 highlights a number of threats. On the Internet, most players use insecure equipment. Typically they cannot send each other electronic documents with evidential value. Insider fraud, as well as damage caused by organised crime...

متن کامل

The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This document is a submission to the IETF Internet Protocol Security (IPsec) Working Group. Comments are solicited and should be addresse...

متن کامل

Data Security in Communications: A Study of Cryptography and Steganography Techniques

Long distance communication using electronic media is prone to unwanted interception just rather more than the communication over traditional channels was. While the traditional communication systems were insecure, it was rather more difficult to intercept communication without the communicating parties realizing that someone has seen the written message, due to either the tampering of the seal...

متن کامل

Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; email is sent in over open networks and e-mail is stored on potentially insecure mail serve...

متن کامل

A Smart Card-based Authentication Scheme Using User Identify Cryptography

The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012