Another Look at PMAC
نویسندگان
چکیده
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than it has been when considered from other viewpoints. In this paper, we can look PMAC with two keys as a Carter-Wegman MAC and get a simple security proof for it. Using this viewpoint to look at PMAC, we will learn not only why the PMAC is such constructed, but also a new method of constructing MACs.
منابع مشابه
YARC - A universal kinematic controller for serial robots based on PMAC and MoveIt!
In this paper, we present a general approach to develop a kinematic controller for any serial robots using Programmable Multi-Axes Controller (PMAC) and MoveIt!. PMAC, a commercial product for motion control, is an all-in-one embedded system to control motion, amplify signals and acquire sensor information. MoveIt! is a state-of-the-art software for kinematicsbased manipulations. It integrates ...
متن کاملImproved security analysis of PMAC
In this paper we provide a simple, concrete and improved security analysis of Parallelizable Message Authentication Code or PMAC. In particular, we show that the advantage of any distinguisher A at distinguishing PMAC from a random function is at most (5qσ − 3.5q)/2. Here, σ is the total number of message blocks in all q queries made by A and PMAC is based on a random permutation over {0, 1}. I...
متن کاملOn the Influence of Message Length in PMAC's Security Bounds
Many MAC (Message Authentication Code) algorithms have security bounds which degrade linearly with the message length. Often there are attacks that confirm the linear dependence on the message length, yet PMAC has remained without attacks. Our results show that PMAC’s message length dependence in security bounds is non-trivial. We start by studying a generalization of PMAC in order to focus on ...
متن کاملIdentification of macrophage external membrane proteins and their possible role in cell adhesion
Starch-activated mouse peritoneal macrophages (STpMAC) plated on plastic demonstrate the adhesive properties typical for activated pMAC: attaching as round cells and, within 15 min, spreading out with marginal membrane ruffles. These attached STpMAC were labeled by lactoperoxidase-catalysed 125I surface iodination, sodium dodecyl-sulfate-lysed, and the lysates electrophoresed on polyacrylamide ...
متن کاملA New Variant of PMAC: Beyond the Birthday Bound
We propose a PMAC-type mode of operation that can be used as a highly secure MAC (Message Authentication Code) or PRF (Pseudo-Random Function). Our scheme is based on the assumption that the underlying n-bit blockcipher is a pseudo-random permutation. Our construction, which we call PMAC Plus, involves extensive modification to PMAC, requiring three blockcipher keys. The PMAC Plus algorithm is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 5 شماره
صفحات -
تاریخ انتشار 2007