The Use of NMACA Approach in Building a Secure Message Authentication Code
نویسندگان
چکیده
Integrity and authentication of long-term stored information are important issues that should be considered in secure storage systems. Digital archived information may include different types of objects with different representation, such as, documents, images and database tables. Authenticity of such information should be verified, especially when it transferred through communication channels. Authentication verification techniques are used to verify that information in the archive is authentic and has not been unintentionally or maliciously altered. In addition to detecting malicious attacks, integrity checks also identify data corrupted information. Message authentication code (MAC) algorithms are keyed hash functions whose specific purpose is message authentication. In most cases, MAC techniques use iterated hash functions, and those techniques are called iterated MACs. Such techniques usually use a MAC key that is used as an input to the compression function, and is involved in the compression function f at every stage. A wide range of authentication techniques use unkeyed hash functions, which are known as modification detection codes (MDCs). MD4, MD5, SHA-1 and RIPEMD-160 are some of many. Recently, powerful new attacks on hash functions such MD5 and SHA-1, among others, suggest introducing more secure hash functions. In this paper, we propose a new MAC methodology that uses an input MAC key on the compression function, to permute the order of message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using MD5 algorithm as a model, a new MD5-MAC algorithm is presented. The MD5-MAC algorithm uses the MAC key in building the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts. Keywords— Message Authentication Code, Modification Detection Code, Information Security, Cryptography, Hashing, MD5
منابع مشابه
NMACA: A Novel Methodology for Message Authentication Code Algorithms
For objects stored in long-term digital archives, checking the integrity of the information stored is a prime necessity in the field of secure storage systems. Objects in a digital archive may include documents, images, databases, ..., etc. In a long-term archive those objects could be transferred in many various ways. In many cases, users are required to verify the authentication of the archiv...
متن کاملCode Based Hashing Technique for Message Authentication Algorithms
In Cryptography, hash functions play a fundamental role in mapping messages into hash codes, where hash codes are served as compact representative of input messages. The hash function is a many-to-one function. Same hash function can be generated from different input messages, implying that the existence of collisions. Cryptographic hash functions are used for data integrity in conjunction with...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل