scispace - formally typeset
Open Access

The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec

S. Frankel, +1 more
- Vol. 3566, pp 1-11
TLDR
This memo specifies the use of AES in CBC mode with a set of extensions to overcome this limitation and names a new algorithm is named AES-XCBC-MAC-96.
Abstract
A Message Authentication Code (MAC) is a key-dependent one way hash function. One popular way to construct a MAC algorithm is to use a block cipher in conjunction with the Cipher-Block-Chaining (CBC) mode of operation. The classic CBC-MAC algorithm, while secure for messages of a pre-selected fixed length, has been shown to be insecure across messages of varying lengths such as the type found in typical IP datagrams. This memo specifies the use of AES in CBC mode with a set of extensions to overcome this limitation. This new algorithm is named AES-XCBC-MAC-96.

read more

Citations
More filters
Journal Article

Advanced Encryption Standard (AES).

TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Patent

Agile network protocol for secure communications using secure domain names

TL;DR: A secure domain name service for a computer network is disclosed that includes a portal connected to the Internet, and a domain name database that stores secure computer network addresses for the computer network as discussed by the authors.
Patent

Method for establishing secure communication link between computers of virtual private network

TL;DR: In this article, a technique for establishing a secure communication link between a first computer and a second computer over a computer network has been described, where one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.

Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs)

TL;DR: A service that enables nodes located behind one or more IPv4 Network Address Translations (NATs) to obtain IPv6 connectivity by tunneling packets over UDP by calling the Teredo service.
Patent

Mass storage device with automated credentials loading

TL;DR: A portable mass storage device for use in two-factor authentication systems and methods is described in this paper, where a client application residing in the mass storage devices acts as both a password manager and an authentication manager that seamlessly performs the authentication procedures in the background while signing a user into various institutions of his choosing.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.

Key words for use in RFCs to Indicate Requirement Levels

S. Bradner
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.

HMAC: Keyed-Hashing for Message Authentication

TL;DR: This document describes HMAC, a mechanism for message authentication using cryptographic hash functions that can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.

IP Authentication Header

S. Kent, +1 more
TL;DR: This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6, and obsoletes RFC 2402 (November 1998).
Journal ArticleDOI

The Security of the Cipher Block Chaining Message Authentication Code

TL;DR: A technical lemma of independent interest is bounding the success probability of a computationally unbounded adversary in distinguishing between a random ml-bit to l-bit function and the CBC MAC of a random l- bit to l -bit function.