ε-MACs: Towards More Secure and More Efficient Constructions of Secure Channels

被引:0
|
作者
Alomair, Basel [1 ]
Poovendran, Radha [1 ]
机构
[1] Univ Washington Seattle, NSL, Seattle, WA USA
关键词
Confidentiality; authenticity; message authentication code (MAC); authenticated encryption; encrypt-and-authenticate; universal hash families; MESSAGE-AUTHENTICATION CODE; HASH FUNCTIONS; ENCRYPTION; MODE; PERFORMANCE; OPERATION; GENERATOR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cryptography, secure channels enable the confidential and authenticated message exchange between authorized users. A generic approach of constructing such channels is by combining an encryption primitive with an authentication primitive (MAC). In this work, we introduce the design of a new cryptographic primitive to be used in the construction of secure channels. Instead of using general purpose MACs, we propose the employment of special purpose MACs, named "epsilon-MACs". The main motive behind this work is the observation that, since the message must be both encrypted and authenticated, there can be a redundancy in the computations performed by the two primitives. If this turned out to be the case, removing such redundancy will improve the efficiency of the overall construction. In addition, computations performed by the encryption algorithm can be further utilized to improve the security of the authentication algorithm. In this work, we show how epsilon-MACs can be designed to reduce the amount of computations required by standard MACs based on universal hash functions, and show how epsilon-MACs can be secured against key-recovery attacks.
引用
收藏
页码:292 / 310
页数:19
相关论文
共 50 条
  • [21] Towards Secure and Practical MACs for Body Sensor Networks
    Gong, Zheng
    Hartel, Pieter
    Nikova, Svetla
    Zhu, Bo
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 182 - +
  • [22] Migration towards a more secure authentication in the Session Initiation Protocol
    Strand, Lars
    Leister, Wolfgang
    Duric, Alan
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS AND TECHNOLOGIES (SECURWARE 2011), 2011, : 57 - 62
  • [23] Secure Software Costs No More
    Toxen, Bob
    COMMUNICATIONS OF THE ACM, 2014, 57 (12) : 8 - 9
  • [24] Toward More Secure Software
    Denning, Dorothy E.
    COMMUNICATIONS OF THE ACM, 2015, 58 (04) : 24 - 26
  • [25] Funding made more secure
    不详
    JOURNAL OF SMALL ANIMAL PRACTICE, 1997, 38 (02) : 85 - 85
  • [26] Delivering more secure software
    Bjones, R
    SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 66 - 72
  • [27] Making minds more secure
    Adshead, Gwen
    PERSONALITY AND MENTAL HEALTH, 2010, 4 (04) : 312 - 318
  • [28] Is grid computing more secure?
    Obert, T
    ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 148 - 159
  • [29] Make WLANs more secure
    Simone, D
    COMMUNICATIONS NEWS, 2006, 43 (02): : 36 - +
  • [30] More better secure logins
    Erickson, J
    DR DOBBS JOURNAL, 1999, 24 (09): : 16 - 16