Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels

被引:26
|
作者
Capkun, Srdjan [1 ]
Cagalj, Mario [2 ]
Rengaswamy, Ramkumar [3 ]
Tsigkogiannis, Ilias [4 ]
Hubaux, Jean-Pierre [5 ]
Srivastava, Mani [6 ]
机构
[1] ETH, Dept Comp Sci, CH-8092 Zurich, Switzerland
[2] Univ Split, Fac Elect Mech Engn & Naval Architecture FESB, Split 21000, Croatia
[3] Google, Mountain View, CA 94040 USA
[4] Microsoft Corp, Redmond, WA 98052 USA
[5] EPFL Swiss Fed Inst Technol, Lab Comp Commun & Applicat LCA, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
[6] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
关键词
Broadcast authentication; integrity; key agreement protocols; man-in-the-middle (MITM) attacks; wireless networks;
D O I
10.1109/TDSC.2008.11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Inspired by unidirectional error-detecting codes that are used in situations where only one kind of bit error is possible (e. g., it is possible to change a bit "0" into a bit "1," but not the contrary), we propose integrity codes (I-codes) for radio communication channels, which enable integrity protection of messages exchanged between entities that do not hold any mutual authentication material (i.e., public keys or shared secret keys). The construction of I-codes enables a sender to encode any message such that if its integrity is violated in transmission over a radio channel, the receiver is able to detect it. In order to achieve this, we rely on the physical properties of the radio channel and on unidirectional error-detecting codes. We analyze in detail the use of I-codes, and we present their implementation on a wireless platform as a " proof of concept." We further introduce a novel concept called "authentication through presence," whose broad applications include broadcast authentication, key establishment, and navigation signal protection. We perform a detailed analysis of the security of our coding scheme, and we show that it is secure within a realistic attacker model.
引用
收藏
页码:208 / 223
页数:16
相关论文
共 50 条
  • [1] Integrity (I) codes:: Message integrity protection and authentication over insecure channels
    Cagalj, Mario
    Capkun, Srdjan
    Rengaswamy, Ramkumar
    Tsigkogiannis, Ilias
    Srivastava, Mani
    Hubaux, Jean-Pierre
    [J]. 2006 IEEE Symposium on Security and Privacy, Proceedings, 2006, : 280 - 294
  • [2] Secure audit logs with forward integrity message authentication codes
    Jiang, T
    Liu, JQ
    Han, Z
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2655 - 2658
  • [3] Message Origin Authentication and Integrity Protection in Chaos-Based Optical Communication
    Rizomiliotis, Panagiotis
    Bogris, Adonis
    Syvridis, Dimitris
    [J]. IEEE JOURNAL OF QUANTUM ELECTRONICS, 2010, 46 (03) : 377 - 383
  • [4] Message Origin Authentication and Integrity Protection in Chaos-based Optical Communication
    Rizomiliotis, Panagiotis
    Bogris, Adonis
    Syvridis, Dimitris
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 814 - +
  • [5] Message Authentication over Noisy Channels
    Zheng, Fanfan
    Xiao, Zhiqing
    Zhou, Shidong
    Wang, Jing
    Huang, Lianfen
    [J]. ENTROPY, 2015, 17 (01) : 368 - 383
  • [6] Authentication mechanisms for call control message integrity and origin verification
    Martin, CE
    Dunn, JH
    [J]. BELL LABS TECHNICAL JOURNAL, 2004, 8 (04) : 71 - 91
  • [7] An approach for data integrity authentication and protection in fog computing
    Babitha, M. N.
    Siddappa, M.
    [J]. MULTIAGENT AND GRID SYSTEMS, 2022, 18 (02) : 87 - 105
  • [8] Composite authentication scheme for data integrity protection in SaaS
    Kong, Lanju
    Li, Lin
    Li, Qingzhong
    Shi, Yuliang
    [J]. Journal of Computational Information Systems, 2014, 10 (15): : 6419 - 6426
  • [9] When and How to Aggregate Message Authentication Codes on Lossy Channels?
    Wagner, Eric
    Serror, Martin
    Wehrle, Klaus
    Henze, Martin
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 241 - 264
  • [10] Protected AIS: A Demonstration of Capability Scheme to Provide Authentication and Message Integrity
    Kessler, G. C.
    [J]. TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 279 - 286