scispace - formally typeset
Patent

Data authentication using modification detection codes based on a public one way encryption function

Reads0
Chats0
TLDR
In this paper, the authors make a distinction between insiders and outsiders, i.e., insiders who have access to the system and outsiders who do not, and make a comparison between two types of attacks.
Abstract
A cryptographic method and apparatus are disclosed which transform a message or arbitrary length into a block of fixed length (128 bits) defined modification detection code (MDC). Although there are a large number of messages which result in the same MDC, because the MDC is a many-to-one function of the input, it is required that it is practically not feasible for an opponent to find them. In analyzing the methods, a distinction is made between two types of attacks, i.e., insiders (who have access to the system) and outsiders (who do not). The first method employs four encryption steps per DEA block and provides the higher degree of security. Coupling between the different DEA operations is provided by using the input keys also as data in two of the four encryption steps. In addition, there is cross coupling by interchanging half of the internal keys. Although this second coupling operation does not add to security in this scheme, it is mandatory in the second method, which employs only two encryption steps per DEA block to trade off security for performance. By providing key cross coupling in both schemes, an identical kernel is established for both methods. This has an implementation advantage since the first method can be achieved by applying the second method twice. The MDC, when loaded into a secure device, authorizes one and only one data set to be authenticated by the MDC, whereas methods based on message authentication codes or digital signatures involving a public key algorithm authorize a plurality of data sets to be authenticated. The MDC therefore provides for greater security control.

read more

Citations
More filters
Patent

Electronic document verification system and method

TL;DR: In this article, the signator of an electronic document can be verified by embedding a security object, for example, supported by an object linking and embedding (OLE) capability, in the electronic document at a location selected by the signators.
Patent

Method and apparatus for assessing integrity of computer system software

TL;DR: In this paper, a hardware latch is used to protect the codes in non-volatile memory from being overwritten by subsequent untrusted programs, and the latch is only reset at system restart, when control returns to the bootstrap program.
Book ChapterDOI

Improving the Efficiency and Reliability of Digital Time-Stamping

TL;DR: Two schemes for digital time-stamping which rely on Cryptographic hash functions, which can be used both to report events succinctly, and to cause events based on documents without revealing their contents are proposed.
Patent

Code certification for network transmission

TL;DR: In this article, a code signing method is used by a publisher or distributor to "sign" an executable file so it can be transmitted with confidence to a recipient over an open network like the Internet.
Patent

Method and apparatus for enhancing computer system security

TL;DR: In this paper, the multiprocessor logic controller is interposed between the CPU and the remainder of the computer system to intercept and replace control signals that are passed over certain critical control signal lines associated with the CPU.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A monte carlo method for factorization

TL;DR: A novel factorization method involving probabilistic ideas is described briefly, and it is suggested that this method should be considered as a viable alternative to traditional factorization methods.
Patent

Transaction security system

TL;DR: In this paper, an electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers.