CBC MAC for real-time data sources

被引:0
|
作者
Petrank, F [1 ]
Rackoff, C
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 3G4, Canada
关键词
message authentication; real time; cipher block chaining; block ciphers;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Cipher Block Chaining (CBC) Message Authentication Code (MAC) is an authentication method which is widely used in practice. It is well known that the use of the CBC MAC for variable length messages is not secure, and a few rules of thumb for the correct use of the CBC MAC are known by folklore. The first rigorous proof of the security of CBC MAC, when used on fixed length messages, was given only recently by Bellare et al. [3]. They also suggested variants of CBC MAC that handle variable-length messages but in these variants the length of the message has to be known in advance (i.e., before the message is processed). We study CBC authentication of real-time applications in which the length of the message is not known until the message ends, and furthermore, since the application is real-time, it is not possible to start processing the authentication until after the message ends. We first consider a variant of CBC MAC, that we call the encrypted CBC MAC (EMAC), which handles messages of variable unknown lengths. Computing EMAC on a message is virtually as simple and as efficient as computing the standard CBC MAC on the message. We provide a rigorous proof that its security is implied by the security of the underlying block cipher. Next, we argue that the basic CBC MAC is secure when applied to a prefix-free message space. A message space can be made prefix-free by also authenticating the (usually hidden) last character which marks the end of the message.
引用
收藏
页码:315 / 338
页数:24
相关论文
共 50 条
  • [31] Real-time data telemetry
    Ryther, John H.
    Magnell, Bruce A.
    Greengrove, Cheryl L.
    Winant, Clinton A.
    Sea Technology, 1988, 29 (08)
  • [32] REAL-TIME DATA ASSIMILATION
    Suzuki, Shoko
    Osogami, Takayuki
    PROCEEDINGS OF THE 2011 WINTER SIMULATION CONFERENCE (WSC), 2011, : 625 - 636
  • [33] Real-time data model
    Liu, Yunsheng
    Yi, Lan
    Yu, Liping
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (05): : 549 - 552
  • [34] REAL-TIME DATA ACQUISITION
    BROWN, H
    JANNEY, R
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1984, 188 (AUG): : 42 - COMP
  • [35] Survey on low power real-time wireless MAC protocols
    Bartolomeu, Paulo
    Alam, Muhammad
    Ferreira, Joaquim
    Fonseca, Jose
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 293 - 316
  • [36] MAC Layer Impact on the Performance of Real-Time Cooperative Positioning
    Sottile, Francesco
    Vesco, Andrea
    Scopigno, Riccardo
    Spirito, Maurizio A.
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012, : 1858 - 1863
  • [37] Isochronous MAC protocol for real-time service support in MANET
    Heo, Ung
    Choi, Jaeho
    2007 INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGY CONVERGENCE, PROCEEDINGS, 2007, : 378 - 382
  • [38] A wireless sensor networks MAC protocol for real-time applications
    Egea-Lopez, E.
    Vales-Alonso, J.
    Martinez-Sala, A. S.
    Garcia-Haro, J.
    Pavon-Marino, P.
    Bueno Delgado, M. V.
    PERSONAL AND UBIQUITOUS COMPUTING, 2008, 12 (02) : 111 - 122
  • [39] A wireless sensor networks MAC protocol for real-time applications
    E. Egea-López
    J. Vales-Alonso
    A. S. Martínez-Sala
    J. García-Haro
    P. Pavón-Mariño
    M. V. Bueno Delgado
    Personal and Ubiquitous Computing, 2008, 12 : 111 - 122
  • [40] Real-time tracking of sources in HDR brachytherapy
    McKenzie, D.
    Nakano, T.
    Suchowerska, N.
    Bilek, M.
    RADIOTHERAPY AND ONCOLOGY, 2007, 84 : S32 - S33