Tail-MAC: An Efficient Message Authentication Scheme for Stream Ciphers
نویسنده
چکیده
A simple and software-efficient algorithm for computing Message Authentication Codes for stream ciphers is described along with the analysis its security. The proposed algorithm was designed to employ some of the data already computed by the underlying stream cipher in the purpose of minimizing the computational cost of the operations required by the MAC algorithm. The performed analyses indicate that the scheme provides a sufficient level of resistance against forgery attacks in a chosen ciphertext attack model, remains simple in its construction and provides high efficiency in software implementations.
منابع مشابه
Tail-MAC: A Message Authentication Scheme for Stream Ciphers
Tail-MAC, A predecessor to the VMPC-MAC, algorithm for computing Message Authentication Codes for stream ciphers is described along with the analysis of its security. The proposed algorithm was designed to employ some of the data already computed by the underlying stream cipher in the purpose of minimizing the computational cost of the operations required by the MAC algorithm. The performed ana...
متن کاملAnalysis of Stream Cipher Based Authenticated Encryption Schemes
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric...
متن کاملThe chain & sum primitive and its applicationsto MACs and stream
We present a new scheme called universal block chaining with sum (or chain & sum primitive (C&S) for short), and show its application to the problem of combined encryption and authentication of data. The primitive is a weak CBC-type encryption along with a summing step, and can be used as a front end to stream ciphers to encrypt pages or blocks of data (e.g., in an encrypted le system or in a v...
متن کاملScaling VEST in Hardware
VEST is an exceptionally efficient cipher family that belongs to the most advanced type of design that offers multi-functionality in one highly efficient module. VEST is readily scaled in hardware. The problem of efficient generation of a secure message digest for scaled ciphers is overcome when VEST is combined with XOR-MAC. XOR-MAC technologies are proven secure but suffer performance restric...
متن کاملAnother Look at Tightness
We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004