.1 Attacks on Message Authentication Schemes
نویسنده
چکیده
• a tagging algorithm Tag : {0, 1}∗ × {0, 1}∗ → {0, 1}∗ that maps a pair consisting of a key K and messageM to a tag σ = TagK(M) = Tag(K,M). • a verification algorithm V erify : {0, 1}∗×{0, 1}∗×{0, 1}∗ → {0, 1} that takes a keyK, a messageM , and a string σ and produces a bit of output. We require that V erifyK(M,σ) = V erify(K,M, σ) if and only if σ is a possible output of TagK(M). For K ∈ {0, 1}, our definitions assume that TagK : {0, 1}∗ → {0, 1}∗. We also allow restricted authentication schemes in which keys of a given size can only be used to authenticate messages of up to a given size. An L(k) → `(k)-message authentication scheme is one in which for each k, Tag : {0, 1} × {0, 1} → {0, 1}. A message authemtication code is a special case of a message authentication scheme in which the algorithm Tag is deterministic and V erifyK(M,σ) simply evaluates the predicate “σ = TagK(M)”. We usually writeMACK(M) instead of TagK(M).
منابع مشابه
Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملA Secure YS-Like User Authentication Scheme
Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attac...
متن کاملL-collision Attacks against Randomized MACs
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added, however. This paper shows that prefixing randomness to a message before running the message through an iterated MAC leads to an attack that takes only O ( 2 +max{2l/2, 2r/2} ) queries to break, where l is the size o...
متن کاملCryptographic Hash Functions: Cryptanalysis, Design and Applications
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. The standard and widely used hash functions such as MD5 and SHA-1 follow the design ...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006