Master’s Project Proposal Ensuring data integrity with tamper evident encryption of integers using keyed Hash Message Authentication Code

نویسندگان

  • Brad Baker
  • Edward Chow
  • Dong Hyeok Lee
  • You Jin Song
  • Sung Min Lee
  • Taek Yong Nam
  • Jong Su Jang
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Michael: the IEEE 802.11i Message Integrity Code

The IEEE 802.11b standard employs a data security mechanism known as Wired Equivalent Privacy (WEP). WEP uses RC4 stream cipher for its data encryption and CRC-32 to check its message integrity. Recent research shows that WEP is not secure as it does not use RC4 and CRC-32 correctly. The latest IEEE 802.11i draft uses a new keyed hash function, called Michael, as the message integrity code. Thi...

متن کامل

On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector

We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These include message authentication code (MAC), authenticated encryption (AE), authenticated encryption with associated data (AEAD) and deterministic authenticated encryption (DAE) with associated data. Several schemes ar...

متن کامل

Flexible and Efficient Message Authentication in Hardware and Software

We present the Galois Message Authentication Code (GMAC), a generic construction based on universal hashing using multiplication in the finite field GF (2). We also present GCM, a block cipher mode of operation that provides both encryption and message integrity in a single primitive, and is based on GMAC. The inherent parallelism in our constructs enable hardware implementations to achieve spe...

متن کامل

A Secure, Peer-to-Peer File Locker System

We have built a secure, distributed, scalable, peer-to-peer file-locker system which enables users to mirror files of their choice in a decentralized "cloud" of individually untrusted commodity consumer computers, while still ensuring the integrity of replicated files by utilizing keyed-hash message authentication codes. Our system is cross-platform (it can be ported to any device which is capa...

متن کامل

On the hardware implementations of the SHA-2 (256, 384, 512) hash functions

Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new encryption algorithms are designed, in order to satisfy the special needs for security. SHA-2 is the newest powerful standard in the hash functions families. In this paper, a VLSI architecture for the SHA-2 family is pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009