نتایج جستجو برای: hmac

تعداد نتایج: 237  

2008
Eunjin Lee Donghoon Chang Jongsung Kim Jaechul Sung Seokhie Hong

In 1992, Zheng, Pieprzyk and Seberry proposed a one-way hashing algorithm called HAVAL, which compresses a message of arbitrary length into a digest of 128, 160, 192, 224 or 256 bits. It operates in so called passes where each pass contains 32 steps. The number of passes can be chosen equal to 3, 4 or 5. In this paper, we devise a new differential path of 3-pass HAVAL with probability 2−114, wh...

Journal: :RFC 2012
Love Hörnquist-Åstrand Tom Yu

The Kerberos 5 network authentication protocol, originally specified in RFC 1510, can use the Data Encryption Standard (DES) for encryption. Almost 30 years after first publishing DES, the National Institute of Standards and Technology (NIST) finally withdrew the standard in 2005, reflecting a long-established consensus that DES is insufficiently secure. By 2008, commercial hardware costing les...

2007
Kan Yasuda

This paper presents a novel mode of operation of compression functions, intended for dedicated use as a message authentication code (MAC.) The new approach is faster than the well-known MerkleDamg̊ard iteration; more precisely, it is (1 + c/b)-times as fast as the classical Merkle-Damg̊ard hashing when applied to a compression function h : {0, 1}c+b → {0, 1}c. Our construction provides a single-k...

2015
David Oswald

To prevent product counterfeiting, a common practice is to cryptographically authenticate system components (e.g., inkjet cartridges, batteries, or spare parts) using dedicated ICs. In this paper, we analyse the security of two wide-spread examples for such devices, the DS28E01 and DS2432 SHA-1-based authentication ICs manufactured by Maxim Integrated. We show that the 64-bit secret can be full...

2009
Shweta Agrawal Dan Boneh

Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be checked using traditional MACs and checksums. In addition, network coded systems are vulnerable to pollution attacks where a single malicious node can flood the network with bad packets and prevent the receiver from decoding the...

Journal: :JNW 2011
Shang-ping Wang Qiao-mei Ma Ya-ling Zhang You-sheng Li

RFID tag has limited calculation resources and small storage capacity, the wireless communication channel between RFID tag and reader is vulnerable to various malicious attacks. Aimed at these problems, a HMAC-based RFID lightweight authentication protocol is proposed in this paper, and some considerations about protocol implementation are made subsequently. In the new protocol, only the Hash f...

2014
Chulhee Cho Jae-Young Choi Jun-Dong Cho Jongpil Jeong

The mobile Virtual Private Network (MVPN) of the Internet Engineering Task Force (IETF) is not designed to support NEtwork MObility (NEMO) and is not suitable for real-time applications. Therefore, architecture and protocols to support VPN in NEMO are needed. Therefore, in this paper we propose a costeffective and secure mobility management scheme (SeSIP) that is based on session initiation pro...

2013
Marcin Rogawski Kris Gaj Ekawat Homsirikamol

One of the five final SHA-3 candidates, Grøstl, has been inspired by the Advanced Encryption Standard. This unique feature can be exploited in a large variety of practical applications. In order to have a better picture of the Grøstl-AES computational efficiency (high-level scheduling, internal pipelining, resource sharing, etc.), we designed a high-speed coprocessor for the Grøstl-based HMAC a...

2014
Chris Hawblitzel Jon Howell Jacob R. Lorch Arjun Narayan Bryan Parno Danfeng Zhang Brian Zill

An Ironclad App lets a user securely transmit her data to a remote machine with the guarantee that every instruction executed on that machine adheres to a formal abstract specification of the app’s behavior. This does more than eliminate implementation vulnerabilities such as buffer overflows, parsing errors, or data leaks; it tells the user exactly how the app will behave at all times. We prov...

2013
P. T. Kalaivaani A. Rajeswari

Wireless Sensor Networks (WSNs) is an interesting topic to the researchers because of its various applications. The applications are health monitoring and environmental monitoring, Industrial Process Monitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and Military Security Systems. The wireless medium requires highly optimized medium Access Protocols to avoid i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید