CBC MAC for real-time data sources

被引:0
|
作者
Petrank, F [1 ]
Rackoff, C
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 3G4, Canada
关键词
message authentication; real time; cipher block chaining; block ciphers;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Cipher Block Chaining (CBC) Message Authentication Code (MAC) is an authentication method which is widely used in practice. It is well known that the use of the CBC MAC for variable length messages is not secure, and a few rules of thumb for the correct use of the CBC MAC are known by folklore. The first rigorous proof of the security of CBC MAC, when used on fixed length messages, was given only recently by Bellare et al. [3]. They also suggested variants of CBC MAC that handle variable-length messages but in these variants the length of the message has to be known in advance (i.e., before the message is processed). We study CBC authentication of real-time applications in which the length of the message is not known until the message ends, and furthermore, since the application is real-time, it is not possible to start processing the authentication until after the message ends. We first consider a variant of CBC MAC, that we call the encrypted CBC MAC (EMAC), which handles messages of variable unknown lengths. Computing EMAC on a message is virtually as simple and as efficient as computing the standard CBC MAC on the message. We provide a rigorous proof that its security is implied by the security of the underlying block cipher. Next, we argue that the basic CBC MAC is secure when applied to a prefix-free message space. A message space can be made prefix-free by also authenticating the (usually hidden) last character which marks the end of the message.
引用
收藏
页码:315 / 338
页数:24
相关论文
共 50 条
  • [1] CBC MAC for real-time data sources
    Petrank E.
    Journal of Cryptology, 2000, 13 (3) : 315 - 338
  • [2] Fully distributed wireless MAC transmission of real-time data
    Markowski, MJ
    Sethi, AS
    FOURTH IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM - PROCEEDINGS, 1998, : 49 - 57
  • [3] FF-MAC : Fast Forward IEEE 802.15.4 MAC Protocol for Real-Time Data Transmission
    El Gholami, Khalid
    Elkamoun, Najib
    Hou, Kun Mean
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 25 - 32
  • [4] A mobility-adaptive TDMA MAC for real-time data in wireless networks
    Lessmann, Johannes
    Held, Dirk
    NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 804 - 811
  • [5] An Energy Efficient Real-Time MAC Protocol
    Kim, Kyeong Tae
    Kim, Jeongnyeo
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 1180 - 1184
  • [6] On Handling Real-Time Communications in MAC Protocols
    Mammeri, Sonia
    Beghdad, Rachid
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (05) : 428 - 435
  • [7] Low power, accurate time synchronization MAC protocol for real-time wireless data acquisition
    Department of Modern Physics, State Key Laboratory of Particle Detection and Electronics, University of Science and Technology of China, Hefei, Anhui 230026, China
    IEEE-NPSS Real Time Conf., RT,
  • [8] Low Power, Accurate Time Synchronization MAC Protocol for Real-Time Wireless Data Acquisition
    Zhang, Jie
    Wu, Jie
    Han, Zhao
    Liu, Liefeng
    Tian, Kaiyun
    Dong, Juan
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2013, 60 (05) : 3683 - 3688
  • [9] Low Power, Accurate Time Synchronization MAC Protocol for Real-time Wireless Data Acquisition
    Zhang, Jie
    Wu, Jie
    Han, Zhao
    Liu, Liefeng
    Tian, Kaiyun
    2012 18TH IEEE-NPSS REAL TIME CONFERENCE (RT), 2012,
  • [10] O-MAC: an optimized MAC protocol for concurrent data transmission in real-time wireless sensor networks
    Phan Van Vinh
    Oh, Hoon
    WIRELESS NETWORKS, 2015, 21 (06) : 1847 - 1861