Best Effort and Practice Activation Codes

نویسندگان

  • Gerhard de Koning Gans
  • Eric R. Verheul
چکیده

Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent value. Even though this class of codes is extensively used there are no general guidelines for the design of Activation Code schemes. We discuss different methods that are used in practice and propose BEPAC, a new Activation Code scheme that provides both authenticity and confidentiality. The small message space of activation codes introduces some problems that are illustrated by an adaptive chosen-plaintext attack (CPA-2) on a general 3-round Feistel network of size 2. This attack recovers the complete permutation from at most 2 plaintext-ciphertext pairs. For this reason, BEPAC is designed in such a way that authenticity and confidentiality are independent properties, i.e. loss of confidentiality does not imply loss of authenticity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Configuration Management for Large - Scale Scientific Computing at the UK

Computational models used in scientific research can become large and complex, and may evolve over many years. Keeping the codes up-to-date to reflect the latest science requires considerable effort, and yet scientific programmers tend to be slow to adopt best practice software development tools. In this paper we report on the experiences of the UK Met Office in adopting a new system for softwa...

متن کامل

Voluntary Approaches: an Assessment and Overview

The purpose of this paper is to provide an overview of the debate around voluntary approaches and their role in public policy. For the purposes of this paper, voluntary approaches include industry codes of conduct (individual company codes and policy statements and industry-wide codes) as well as government sponsored or supported programmes, where industry participation is voluntary. The specif...

متن کامل

An Improved COCOMO based Model to Estimate the Effort of Software Projects

One of important aspects of software projects is estimating the cost and time required to develop projects. Nowadays, this issue has become one of the key concerns of project managers. Accurate estimation of essential effort to produce and develop software is heavily effective on success or failure of software projects and it is highly regarded as a vital factor. Failure to achieve convincing a...

متن کامل

Coded Status Updates in an Energy Harvesting Erasure Channel

We consider an energy harvesting transmitter sending status updates to a receiver over an erasure channel, where each status update is of length k symbols. The energy arrivals and the channel erasures are independent and identically distributed (i.i.d.) and Bernoulli distributed in each slot. In order to combat the effects of the erasures in the channel and the uncertainty in the energy arrival...

متن کامل

Qualitative Study of Students' Information Sharing Behavior in Social Network Sites

Aim: The main purpose was to investigate the students’ information sharing behavior in social network sites with a qualitative approach. Methodology: An applied research with qualitative approach - A Thematic Analysis method was used.  Population consisted of all the students at the Universities in South Khorasan Province affiliated with the Ministry of Science, Research and Technology who had ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011