Message integrity of IAPM and IACBC

نویسنده

  • Johan Hastad
چکیده

Jutla [1] g a ve two s hemes to ombine message integrity with en ryption. The methods use a blo kipher as the main ingredient. To analyze these s hemes we repla e the blo k en ryption by a random permutation and analyze the onstru tion in an information theoreti way. The rationale behind this is that a g o o d blo k ipher should b e a pseudorandom permutation and thus for an atta ker that does not know the key the real situation is omputationally indistinguishable from the situation des ribed above. Note that this is a preliminary paper and in the full paper we will have a more omplete introdu tion whi h also ompares to related work.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Basic comparison of Modes for Authenticated - Encryption ( IAPM , XCBC , OCB , CCM , EAX , CWC , GCM , PCFB , CS )

An authentication-encryption (AE) scheme is an encryption scheme with a pre-shared key providing both data privacy and authenticity. Basic AE scheme can be constructed by a naive (serial) combination of some existing encryption mode together with a message authentication code (MAC). The computation cost of such approach equals to cost of the encryption plus the cost of the MAC. There are severa...

متن کامل

1 Reasoning about Message Integrity 1 Rajashekar

We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...

متن کامل

Reasoning about Message Integrity

We propose an approach for reasoning about message integrity protection in cryptographic protocols. The set of axioms presented herein relate design parameters and assumptions of message integrity protection mechanisms to generic message integrity threats. Comparison of threat properties derived using these axioms with the policy goals for integrity protection aids in assessing the strength (or...

متن کامل

Physical-layer integrity for wireless messages

In this work, we discuss physical layer message manipulation attacks, in which an attacker changes physical-layer properties of an original wireless message. Instead of targeting the data content of the message, those attacks target message properties such as time-of-arrival, signal strength, angle-of-arrival, and others. As such attacks do not change the data content, they do not violate the m...

متن کامل

A Combined Method for Confidentiality, Integrity, Availability and Authentication (CMCIAA)

--This paper introduces a single method that ensures the Confidentiality, Integrity, Availability and Authentication of the message to be transmitted. Message is encrypted by the latest symmetric encryption standard called AES (Advanced Encryption Standard). A new method for calculating MAC (Message Authentication Code) based on the shared secret key used in AES, is proposed that proves the mes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001