scispace - formally typeset
Proceedings ArticleDOI

Pseudo-random key generation for secure HMAC-MD5

Syeda Iffat Naqvi, +1 more
- pp 573-577
TLDR
The goal of this paper is to improve the strength of Hash Message Authentication Code (HMAC), so that its resistance increases to the Birthday Attack and Exhaustive key Search Attack.
Abstract
Cryptographic hash functions had been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and most important of them is their use in the composition of efficient Message Authentication Codes (MACs). The cryptanalysis of hashing algorithms used in Hash Message Authentication Code(HMAC) like SHA-1 and MD5 have found many attacks against them [5], [6], [7], [8]. But this does not mean that if the underlying hashing algorithms are breakable then HMAC is also breakable. It is infeasible for the attacker to break HMAC because he would not be able to generate message sets offline without predicting the key K. The goal of this paper is to improve the strength of Hash Message Authentication Code (HMAC), so that its resistance increases to the Birthday Attack and Exhaustive key Search Attack. The secret key used in calculation of HMAC is shared among the sender and the recipient. We generated the Secret key with the help of a pseudorandom MD6 hashing function so that it becomes more secure and hard to envisage by forgery.

read more

Citations
More filters
Journal ArticleDOI

A Secure M-Commerce System based on credit card transaction

TL;DR: This paper proposes a secure m-commerce scheme, called the Secure M-Commerce System (SMCS for short), with which users can create a safe credit-card transaction for Internet shopping and employs a Data Connection Core to link the card-issuing bank and consumers before their wireless communication starts so as to significantly improve the security level of the m- commerce environment.
Journal ArticleDOI

Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System

TL;DR: This work aims to provide an efficient and secure, lightweight E 2E S2S message delivery function, which includes the E2E S 2S secure key and biometric parameter exchange function, a bio-shared parameter and bio-key generation function, secure lightweight E2 e-mail communication negotiation and secure E2S lightweight message delivery.

HMAC Modification Using New Random Key Generator

TL;DR: A new way to achieve hash code authorization message to increase the strength of the code, reluctance to Birthday attack, and key's exhaustive search is introduced.
Journal ArticleDOI

Dual Authentication Hashing for Security Enhancement in MANET

L. Raja, +1 more
- 13 Apr 2016 - 
TL;DR: Intrusion detection based on DAHT (Dual Authentication Hash Technique) entirely depends on the end to end communication between the source and destination is employed here and shows that malicious detection, overhead reduction and delay are better when compared to the existing system that is employed in protecting the routing information.
Proceedings ArticleDOI

Robust scheme to protect authentication code of message/image documents in cloud computing

TL;DR: This paper proposes a scheme to ensure message/ image document integrity for each user's login by providing one-time biometric message/image authentication code called MACLESS, which is a summation of combining the key-based hash function (MAC-SHA-1) of a message/images document and the one- time bio-key.
References
More filters
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book ChapterDOI

Keying Hash Functions for Message Authentication

TL;DR: Two new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths.
Book ChapterDOI

How to break MD5 and other hash functions

TL;DR: A new powerful attack on MD5 is presented, which unlike most differential attacks, does not use the exclusive-or as a measure of difference, but instead uses modular integer subtraction as the measure.
Journal Article

Collisions for the compression function of MD5

TL;DR: An algorithm is described that establishes a work load of about 2 collisions for the first two rounds of the MD5 compression function to a collision for the entire four round function.
Dissertation

Security Proofs for the MD6 Hash Function Mode of Operation

TL;DR: This work demonstrates provably that the mode of operation used in MD6 preserves some cryptographic properties of the compression function — that is, assuming some ideal conditions about the compressionfunction used, the overall MD6 hash function is secure as well.