A Counter-based MAC Revisited: Towards Better Security
نویسنده
چکیده
Bellare, Guérin, and Rogaway proposed a very efficient and secure message authentication scheme. By slightly modifying it, this article shows that the security is improved.
منابع مشابه
Lifting the Security of NI-MAC Beyond Birthday Bound
In CRYPTO 1999, J. An and M. Bellare proposed a MerkleDamg̊ard iteration based MAC construction called NI-MAC in order to avoid constant re-keying on multiblock messages in NMAC and to ease the security proof. In CRYPTO 2014, Gazi et al. revisited the proof of NI-MAC in the view of structure graph introduced by Bellare et al. in CRYPTO 2005 and gave a tight bound of order lq 2 2n , which is an i...
متن کاملMalicious Node Detection System for Mobile Ad hoc Networks
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet...
متن کاملOn the Security of CTR + CBC-MAC
We analyze the security of the CTR + CBC-MAC (CCM) encryption mode. This mode, proposed by Doug Whiting, Russ Housley, and Niels Ferguson, combines the CTR (“counter”) encryption mode with CBC-MAC message authentication and is based on a block cipher such as AES. We present concrete lower bounds for the security of CCM in terms of the security of the underlying block cipher. The conclusion is t...
متن کاملCounter Measures to Combat Misuses of MAC Address Spoofing Techniques
Counter Measures to Combat Misuses of MAC Address Spoofing Techniques Alok Pandey Sr. Systems Manager, Birla Institute of Technology (Mesra), Jaipur Campus, Jaipur, Rajasthan, India Email: [email protected] Dr. Jatinderkumar R. Saini Associate Professor & I/C Director, Narmada College of Computer Application, Bharuch, Gujarat, India Email: [email protected] -----------------------...
متن کاملRFC 5289 TLS ECC New MAC August
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS). However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm. This document describes sixte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2005 شماره
صفحات -
تاریخ انتشار 2005