نتایج جستجو برای: hmac

تعداد نتایج: 237  

Journal: :IACR Cryptology ePrint Archive 2014
Jian Guo Yu Sasaki Lei Wang Meiqin Wang Long Wen

A main contribution of this paper is an improved analysis against HMAC instantiating with reduced Whirlpool. It recovers equivalent keys, which are often denoted as Kin and Kout, of HMAC with 7-round Whirlpool, while the previous best attack can work only for 6 rounds. Our approach is applying the meet-in-the-middle (MITM) attack on AES to recover MAC keys of Whirlpool. Several techniques are p...

2012
Christina Boura Sylvain Lévêque David Vigilant

This work1 provides a detailed study of two finalists of the SHA-3 competition from the sidechannel analysis point of view. For both functions when used as a MAC, this paper presents detected strategies for performing a power analysis. Besides the classical HMAC mode, two additionally proposed constructions, the envelope MAC for Grøstl and the Skein-MAC for Skein, are analyzed. Consequently, ex...

Journal: :CoRR 2016
Sven Zehl Anatolij Zubow Adam Wolisz

We present our current work-in-progress on the design and implementation of a hybrid TDMA/CSMA medium access architecture, hereafter referred to as hMAC, which can be used on top of commercial IEEE 802.11 off-the-shelf hardware. The software only solution is based on the popular Linux ATH9K softMAC driver and hence can be used with standard Linux systems using Atheros based wireless network dev...

Journal: :IACR Cryptology ePrint Archive 2010
Zheng Yuan Jintao Liu Xiaoqiu Ren

A new distinguishing attack on HMAC and NMAC based on a dedicated compression function framework H, proposed in ChinaCrypt2008, is first presented in this paper, which distinguish the HMAC/NMACH from HMAC/NMAC with a random function. The attack needs 2 chosen messages and 2 queries, with a success rate of 0.873. Furthermore, according to distinguishing attack on SPMAC-H, a key recovery attack o...

2005
H. E. MICHAIL A. P. KAKAROUNTAS E. FOTOPOULOU C. E. GOUTIS

In this paper an efficient implementation, in terms of performance, of the keyed-hash message authentication code (HMAC) using the SHA-256 hash function is presented. This mechanism is used for message authentication in combination with a shared secret key. The proposed hardware implementation, invokes a partially unrolled implementation for the underlying hash function leading to a high-throug...

Journal: :IACR Cryptology ePrint Archive 2012
Thomas Peyrin Yu Sasaki Lei Wang

In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single related-key) for the HMAC construction. When HMAC uses a k-bit key, outputs an n-bit MAC, and is instantiated with an l-bit inner iterative hash function processing m-bit message blocks where m = k, our distinguishing-R attack requires about 2 queries which improves over t...

Journal: :Sustainability 2022

Traditional hard-grade asphalts for high-modulus asphalt concrete (HMAC) are produced by using natural to modify matrix asphalts. However, scarce and expensive. To find a sustainable alternative, this study presented method synthesize phenol formaldehyde resin (PFR), hexamethylenetetramine (HMTA) Infrared radiation (IR) spectra analysis fraction the modifiers show that molecules can be cross-li...

2014
Mohannad Najjar

In this paper we are developing an algorithm to increase the security of using HMAC function (Key-Hashed Message Authentication) to insure data integrity for exchanging archival files. Hash function is a very strong tool used in information security. The algorithm we are developing is safe, quick and will allow the University of Tabuk (UT) authorities to be sure that data of archival document w...

2004
M. Euchner

This document describes a point-to-point key management protocol variant for the multimedia Internet keying (MIKEY). In particular, the classic Diffie-Hellman key agreement protocol is used for key establishment in conjunction with a keyed hash (HMAC-SHA1) for Euchner Expires û January 2004 [Page 1] HMAC-authenticated Diffie-Hellman for MIKEY July 2003 achieving mutual authentication and messag...

Journal: :IEEE Access 2023

In VLSI circuit design, physical design is one of the main steps in placing into chip area. Floorplanning a crucial step IC which generates blueprint for placement modules chip. A floorplanning accepts netlist as its input, given by circuit-partitioning design. The optimal placements modules. contains modules’ dimensions, size, and interconnect information. During floorplan generation, area, wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید