#v{d ÷d õ® LFSR-BASED CRYPTOGRAPHIC CHECKSUMS FOR SECURE BROADCASTING
نویسنده
چکیده
In this paper, we present a scheme for generating cryptographic checksums to perform message authentication in a one-way broadcasting system. The proposed scheme is based on the use of clockcontrolled LFSRs and is aimed at high-speed implementation for real-time applications. INTRODUCTION In a typical secure broadcasting system, source information (video, voice, images, text,..., etc.) are transmitted in a scrambled structure from the broadcast center and all the receivers get the same broadcasting signal consisting of scrambled information and access control information [1]. A set of randomly generated decryption keys, master keys, are stored in a physically secure and tamperproof module inside the legitimate receivers while the center keep a copy of corresponding encryption keys at a database against receiver's unique ID, etc. Successful descrambling occurs in authorized receivers when correctly encrypted descrambling keys were delivered from the broadcast center. Although the cryptographic algorithm selected for distributing descrambling key could either be a public-key algorithm or a private-key algorithm, DES-alike schemes are usually chosen and implemented in firmware or software to provide key distribution in a secure and cost-effective manner. The receivers are individually addressable, meaning they can be directly controlled, using the unique master key, at any time from the broadcast center. Nevertheless, it is very inefficient to deliver the descrambling key to each receiver on an individual basis, therefore a key distribution hierarchy is normally developed. The idea is to form receiver groups and each member of the same group shares the identical distribution key [1]. In a three-level hierarchy of keys, the descrambling key is downloaded into receivers through a broadcasting message encrypted by the shared group key while the group keys is encrypted by the master key and distributed in advance into the secure module in the authorized receivers. Message for distributing the group key has to be extremely insensitive to transmission errors and a check must also be made by the receiver of the message that it has not been deliberately altered since it left the broadcast center. Furthermore, the delay and complexity that is required in implementing this message authentication must be satisfied with real-time and low-cost constrains in a commercial one-way broadcast system. Cryptographic checksums (also known as message authentication codes, integrity check-values, modification detection codes, or message integrity codes) are used to detect unauthorized alternation of message being transmission between two mutually trusted parties [2-5]. Much like an ordinary checksum or cyclic redundancy check (CRC), a checksum is appended to the transmitted message and the number of checksum bits are generally less than the number of message bits to be transmitted. However, the cryptographic checksum will be dependent not only on the original message but also on a secret key known only between the sender and the intended receiver. When a message is transmitted, the broadcast center calculates a checksum using the agreed secret key and appends it to the message (Figure 1).
منابع مشابه
Enhancing File System Integrity Through Checksums
Providing a way to check the integrity of information stored in an unreliable medium is a prime necessity in the field of secure storage systems. Also in operating systems like Unix that allow a user to bypass the file system to access the raw disk, integrity checks not only detect data corruption, but also track malicious attacks. Checksumming is a common way of ensuring data integrity. Checks...
متن کاملThe Differential Cryptanalysis and Design of Natural Stream Ciphers
This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis. The relationships between differential and other types of stream cipher analysis are presented. The conservation laws of patterns and of mutual information are derived. The cryptographic significance of pattern distribution of keystream sequences is shown. The cryptographic trans...
متن کاملOn cryptographic properties of LFSR-based pseudorandom generators
Pseudorandom generators (PRGs) are used in modern cryptography to transform a small initial value into a long sequence of seemingly random bits. Many designs for PRGs are based on linear feedback shift registers (LFSRs), which can be constructed in such a way as to have optimal statistical and periodical properties. This thesis discusses construction principles and cryptanalytic attacks against...
متن کاملAnalysis of LFSR Based Snow Family against Guess and Determine Attack
Stream Cipher is a cryptographic primitive that is used to make sure privacy on a communication channel. SNOW family is a typical example of word oriented stream ciphers based on Linear Feedback Shift Register (LFSR). In this paper two versions of SNOW family have been analyzed against Guess and Determine (GD) Attack. Original SNOW 2.0 is an improved version of SNOW 1.0 claimed to be more secur...
متن کاملLFSR-based Hashing and Authentication
We present simple and efficient hash functions applicable to secure authentication of information. The constructions are mainly intended for message authentication in systems implementing stream cipher encryption and are suitable for other applications as well. The proposed hash functions are implemented through linear feedback shift registers and therefore attractive for hardware applications....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999