#v{d ÷d õ® LFSR-BASED CRYPTOGRAPHIC CHECKSUMS FOR SECURE BROADCASTING

نویسنده

  • Chung-Huang Yang
چکیده

In this paper, we present a scheme for generating cryptographic checksums to perform message authentication in a one-way broadcasting system. The proposed scheme is based on the use of clockcontrolled LFSRs and is aimed at high-speed implementation for real-time applications. INTRODUCTION In a typical secure broadcasting system, source information (video, voice, images, text,..., etc.) are transmitted in a scrambled structure from the broadcast center and all the receivers get the same broadcasting signal consisting of scrambled information and access control information [1]. A set of randomly generated decryption keys, master keys, are stored in a physically secure and tamperproof module inside the legitimate receivers while the center keep a copy of corresponding encryption keys at a database against receiver's unique ID, etc. Successful descrambling occurs in authorized receivers when correctly encrypted descrambling keys were delivered from the broadcast center. Although the cryptographic algorithm selected for distributing descrambling key could either be a public-key algorithm or a private-key algorithm, DES-alike schemes are usually chosen and implemented in firmware or software to provide key distribution in a secure and cost-effective manner. The receivers are individually addressable, meaning they can be directly controlled, using the unique master key, at any time from the broadcast center. Nevertheless, it is very inefficient to deliver the descrambling key to each receiver on an individual basis, therefore a key distribution hierarchy is normally developed. The idea is to form receiver groups and each member of the same group shares the identical distribution key [1]. In a three-level hierarchy of keys, the descrambling key is downloaded into receivers through a broadcasting message encrypted by the shared group key while the group keys is encrypted by the master key and distributed in advance into the secure module in the authorized receivers. Message for distributing the group key has to be extremely insensitive to transmission errors and a check must also be made by the receiver of the message that it has not been deliberately altered since it left the broadcast center. Furthermore, the delay and complexity that is required in implementing this message authentication must be satisfied with real-time and low-cost constrains in a commercial one-way broadcast system. Cryptographic checksums (also known as message authentication codes, integrity check-values, modification detection codes, or message integrity codes) are used to detect unauthorized alternation of message being transmission between two mutually trusted parties [2-5]. Much like an ordinary checksum or cyclic redundancy check (CRC), a checksum is appended to the transmitted message and the number of checksum bits are generally less than the number of message bits to be transmitted. However, the cryptographic checksum will be dependent not only on the original message but also on a secret key known only between the sender and the intended receiver. When a message is transmitted, the broadcast center calculates a checksum using the agreed secret key and appends it to the message (Figure 1).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing File System Integrity Through Checksums

Providing a way to check the integrity of information stored in an unreliable medium is a prime necessity in the field of secure storage systems. Also in operating systems like Unix that allow a user to bypass the file system to access the raw disk, integrity checks not only detect data corruption, but also track malicious attacks. Checksumming is a common way of ensuring data integrity. Checks...

متن کامل

The Differential Cryptanalysis and Design of Natural Stream Ciphers

This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis. The relationships between differential and other types of stream cipher analysis are presented. The conservation laws of patterns and of mutual information are derived. The cryptographic significance of pattern distribution of keystream sequences is shown. The cryptographic trans...

متن کامل

On cryptographic properties of LFSR-based pseudorandom generators

Pseudorandom generators (PRGs) are used in modern cryptography to transform a small initial value into a long sequence of seemingly random bits. Many designs for PRGs are based on linear feedback shift registers (LFSRs), which can be constructed in such a way as to have optimal statistical and periodical properties. This thesis discusses construction principles and cryptanalytic attacks against...

متن کامل

Analysis of LFSR Based Snow Family against Guess and Determine Attack

Stream Cipher is a cryptographic primitive that is used to make sure privacy on a communication channel. SNOW family is a typical example of word oriented stream ciphers based on Linear Feedback Shift Register (LFSR). In this paper two versions of SNOW family have been analyzed against Guess and Determine (GD) Attack. Original SNOW 2.0 is an improved version of SNOW 1.0 claimed to be more secur...

متن کامل

LFSR-based Hashing and Authentication

We present simple and efficient hash functions applicable to secure authentication of information. The constructions are mainly intended for message authentication in systems implementing stream cipher encryption and are suitable for other applications as well. The proposed hash functions are implemented through linear feedback shift registers and therefore attractive for hardware applications....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999