ABYSS: An Architecture for Software Protection
IEEE Transactions on Software Engineering
Adequacy of checksum algorithms for computer virus detection
SIGSMALL '90 Proceedings of the 1990 ACM SIGSMALL/PC symposium on Small systems
Adequacy of checksum algorithms for computer virus detection
ACM SIGSMALL/PC Notes
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
CRYPTO '85 Advances in Cryptology
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
MDx-MAC and Building Fast MACs from Hash Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Does Encryption with Redundancy Provide Authenticity?
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Hash-functions using modulo-N operations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
In many applications of cryptography, assuring theauthenticity of communications is as important asprotecting their secrecy. A well known and securemethod of providing message authentication is tocompute a Message Authentication Code (MAC) byencrypting the message. If only one key is used toboth encrypt and authenticate a message, however,the system is subject to several forms ofcryptographic attack. Techniques have also beensought for combining secrecy and authentication inonly one encryption pass, using a ManipulationDetection Code generated by noncryptographicmeans. Previous investigations have shown that aproposed MDC technique involving block-by-blockExclusive-ORing is not secure when used with theCipher Block Chaining (CBC) mode of operation of theData Encryption Standard (DES]. It is shown herethat the Cipher Feedback (CFEI) mode of operationexhibits similar weaknesses. A linear addition modulo264 MDC is analyzed, including discussion of severalnovel attack scenarios. A Quadratic CongruentialManipulation Detection Code is proposed to avoid theproblems of previous schemes.