BMAC IS INSECURE Page 1 AUTHENTICATING MULTI-CAST INTERNET ELECTRONIC MAIL MESSAGES USING A BIDIRECTIONAL MAC IS INSECURE
نویسنده
چکیده
The 1988 version of the message encryption and authentication procedures for Internet electronic mail makes use of a 'Bidirectional MAC' or BMAC. When used for multi-cast electronic mail it is important that this BMAC acts as a one-way function. We show here that it is not a one-way function, which means that the BMAC technique should not be used for authenticating multi-cast messages.
منابع مشابه
Secure Electronic Commerce
Such trade does, however, take place on an insecure environment (the Internet), in which communication partners may cheat, and in which other parties may do harm. Table 1 highlights a number of threats. On the Internet, most players use insecure equipment. Typically they cannot send each other electronic documents with evidential value. Insider fraud, as well as damage caused by organised crime...
متن کاملThe AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This document is a submission to the IETF Internet Protocol Security (IPsec) Working Group. Comments are solicited and should be addresse...
متن کاملData Security in Communications: A Study of Cryptography and Steganography Techniques
Long distance communication using electronic media is prone to unwanted interception just rather more than the communication over traditional channels was. While the traditional communication systems were insecure, it was rather more difficult to intercept communication without the communicating parties realizing that someone has seen the written message, due to either the tampering of the seal...
متن کاملSecuring E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices
One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; email is sent in over open networks and e-mail is stored on potentially insecure mail serve...
متن کاملA Smart Card-based Authentication Scheme Using User Identify Cryptography
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy o...
متن کامل