Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm

نویسندگان

  • Hubert Garavel
  • Lina Marsso
چکیده

TheMessage Authenticator Algorithm (MAA) is one of the first cryptographic functions for computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity and integrity of banking transactions. In 1990 and 1991, three formal, yet non-executable, specifications of the MAA (in VDM, Z, and LOTOS) were developed at NPL. Since then, five formal executable specifications of the MAA (in LOTOS, LNT, and term rewrite systems) have been designed at INRIA Grenoble. This article provides an overview of the MAA and compares its formal specifications with respect to common-sense criteria, such as conciseness, readability, and efficiency of code generation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Design of a Brushless DC Motor, by Cuckoo Optimization Algorithm (RESEARCH NOTE)

This contribution deals with an optimal design of a brushless DC motor, using optimization algorithms, based on collective intelligence. For this purpose, the case study motor is perfectly explained and its significant specifications are obtained as functions of the motor geometric parameters. In fact, the geometric parameters of the motor are considered as optimization variables. Then, the obj...

متن کامل

Polynomial evaluation and message authentication

The cryptographic literature contains many provably secure highspeed authenticators. Some authenticators use n multiplications for length-n messages; some authenticators have the advantage of using only about n/2 multiplications. Some authenticators use n variables for length-n messages; some authenticators have the advantage of using only 1 variable. This paper, after reviewing relevant polyno...

متن کامل

Security analysis of the message authenticator algorithm (MAA)

The security of the ISO banking standard Message Authenticator Algorithm (ISO 87312), also known as MAA, is considered. The attacks, which exploit the internal structure of the algorithm, are the first computationally feasible attacks on MAA. First a MAC forgery attack is presented that requires 2 messages of 256 Kbytes or 2 messages of 1 Kbyte; the latter circumvents the special MAA mode for l...

متن کامل

A Comparative Study of Iranian and Turkish Formal Education System of Handicraft: With the approach of

Handicrafts, due to cultural and economic capabilities, have recently been featured in some countries as one of the subcategories of creative cultural industries and countries such as China, South Korea and the UK have made precise plans in this regard. Turkey, which has long cooperated with Iran in the field of handicrafts, is one of the leading countries in the field of cultural industries. S...

متن کامل

Session Corruption Attack and Improvements on Encryption Based MT-Authenticators

Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of practical attackers but also provides a modular approach to the design of secure key exchange protocols. One important element in this approach is the MTauthenticator. An MT-authenticator transforms a message transmission ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018