نتایج جستجو برای: hmac
تعداد نتایج: 237 فیلتر نتایج به سال:
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key....
At Crypto ’06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Conversely, at Asiacrypt ’06, Contini and Yin used collision techniques to obtain forgery and partial key-recovery attacks on HMAC and NMAC instantiated with MD4, MD5, SHA-0 and reduced SHA-1. In this paper, we present the firs...
The murine Mac-2 protein is a galactose- and IgE-binding lectin secreted by inflammatory macrophages. We describe here the cloning and characterization of a cDNA representing the human homolog of Mac-2 (hMac-2). The amino acid sequence derived from the hMac-2 cDNA indicates that the protein is evolutionarily highly conserved, with 85% of its amino acid residues being similar to those in the mur...
In this note, we present a full key recovery attack on HMACAURORA-512 when 512-bit secret keys are used and the MAC length is 512-bit long. Our attack requires 2 queries and the off-line complexity is 2 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search for a 512-bit key. The attack can be carried out with a negligible amount of memory. Our attack ca...
This paper presents the first equivalent key recovery attack on H2-MAC-MD5, which conduces to a selective forgery attack directly. H2-MAC is similar with HMAC except that the outer key is omitted. For HMAC-MD5, since the available differential paths are pseudocollisions, all the key recovery attacks are in the related-key setting, while our attack on H2MAC-MD5 gets rid of this restriction. Base...
It has been discussed in the literature that the medium-access control (MAC) protocols, which schedule periodic sleep–active states of sensor nodes, can increase the longevity of sensor networks. However, these protocols suffer from very low end-toend throughput and increased end-to-end packet delay. How to design an energy-efficient MAC protocol that greatly minimizes the packet delay while ma...
In this paper cluster-based hybrid MAC (CB-HMAC) protocol, based on IEEE 802.15.4 is proposed for smart home networks. The CB-HMAC specially designed short packet transmission in a dense network environment. Simulation results show that the more energy-efficient than other medium access control (MAC) protocols without sacrificing much delay and throughput.
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes use arithmetical addition. We apply to HMAC-SHA-2. provide full mathematical analysis of the method and show under certain assumptions with sufficient amount traces any key can be revealed. experimental part demonstrate successful application attack both in software ...
constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in computationally constrained environments like Wireless sensor networks and RFID. DECIM is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. It is highly scrutinized stream cipher and is portable to implement hashing for highly compact MAC, whi...
Over the past decade, the Texas Department of Transportation (TxDOT) focused research efforts on improving hot mix asphalt concrete (HMAC) mix design to preclude rutting in the early life of pavements. However, these rut-resistant stiff mixtures may be susceptible to long-term fatigue cracking due to oxidative aging. This project completed initial development of an HMAC mixture fatigue design a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید