CBC MAC for real-time data sources

被引:0
|
作者
Petrank, F [1 ]
Rackoff, C
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Univ Toronto, Dept Comp Sci, Toronto, ON M5S 3G4, Canada
关键词
message authentication; real time; cipher block chaining; block ciphers;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Cipher Block Chaining (CBC) Message Authentication Code (MAC) is an authentication method which is widely used in practice. It is well known that the use of the CBC MAC for variable length messages is not secure, and a few rules of thumb for the correct use of the CBC MAC are known by folklore. The first rigorous proof of the security of CBC MAC, when used on fixed length messages, was given only recently by Bellare et al. [3]. They also suggested variants of CBC MAC that handle variable-length messages but in these variants the length of the message has to be known in advance (i.e., before the message is processed). We study CBC authentication of real-time applications in which the length of the message is not known until the message ends, and furthermore, since the application is real-time, it is not possible to start processing the authentication until after the message ends. We first consider a variant of CBC MAC, that we call the encrypted CBC MAC (EMAC), which handles messages of variable unknown lengths. Computing EMAC on a message is virtually as simple and as efficient as computing the standard CBC MAC on the message. We provide a rigorous proof that its security is implied by the security of the underlying block cipher. Next, we argue that the basic CBC MAC is secure when applied to a prefix-free message space. A message space can be made prefix-free by also authenticating the (usually hidden) last character which marks the end of the message.
引用
收藏
页码:315 / 338
页数:24
相关论文
共 50 条
  • [1] CBC MAC for real-time data sources
    Petrank E.
    Journal of Cryptology, 2000, 13 (3) : 315 - 338
  • [2] O-MAC: an optimized MAC protocol for concurrent data transmission in real-time wireless sensor networks
    Phan Van Vinh
    Oh, Hoon
    WIRELESS NETWORKS, 2015, 21 (06) : 1847 - 1861
  • [3] O-MAC: an optimized MAC protocol for concurrent data transmission in real-time wireless sensor networks
    Phan Van Vinh
    Hoon Oh
    Wireless Networks, 2015, 21 : 1847 - 1861
  • [4] A new real-time ethernet MAC protocol for time-critical applications
    Shen, G
    Xu, XM
    Cai, YZ
    He, X
    Zhang, WD
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2002, 9 (01): : 54 - 58
  • [5] A new real-time ethernet MAC protocol for time-critical applications
    沈钢
    许晓鸣
    蔡云泽
    何星
    张卫东
    Journal of Central South University of Technology(English Edition), 2002, (01) : 54 - 58
  • [6] TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks
    Song, Wen-Zhan
    Huang, Renjie
    Shirazi, Behrooz
    LaHusen, Richard
    PERVASIVE AND MOBILE COMPUTING, 2009, 5 (06) : 750 - 765
  • [7] A new real-time ethernet MAC protocol for time-critical applications
    Gang Shen
    Xiao-ming Xu
    Yun-ze Cai
    Xing He
    Wei-dong Zhang
    Journal of Central South University of Technology, 2002, 9 : 54 - 58
  • [8] Real-time slicing of data space
    Crawfis, RA
    VISUALIZATION '96, PROCEEDINGS, 1996, : 271 - 277
  • [9] Real-time validation of hydrometric data
    Faouzi, B
    Malika, K
    Saad, B
    CANADIAN JOURNAL OF CIVIL ENGINEERING, 2003, 30 (01) : 212 - 225
  • [10] Static real-time data distribution
    Uvarov, A
    DiPippo, L
    Fay-Wolfe, V
    Bryan, K
    Gadrow, P
    Henry, T
    Murphy, M
    Work, PR
    DiPalma, LP
    RTAS 2004: 10TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2004, : 502 - 509