scispace - formally typeset
Search or ask a question

Showing papers on "Message authentication code published in 1984"


Proceedings ArticleDOI
01 Apr 1984
TL;DR: Computer networks employ encryption several purposes, including private communication, message authentication, and digital signatures, which depend not only on the strength the cryptographic algorithms, but also on the procedures for key management.
Abstract: Computer networks employ encryption several purposes, including private communication, message authentication, and digital signatures. The correctness and security of these applications depend not only on the strength the cryptographic algorithms, but also on the procedures for key management.

74 citations


Patent
29 Aug 1984
TL;DR: In this paper, an electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers.
Abstract: An electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centres. Users of the system are issued with intelligent secure bank cards, which include a microprocessor, ROS and RAM stores. The ROS includes a personal key (KP) and an account number (PAN) stored on the card when the issuer issues it to the user. Users also have a personal identity number (PIN) which is stored or remembered separately. A transaction is initiated at a retail terminal when a card is inserted in an EFT module connected to the terminal. A request message including the PAN and a session key (KS) is transmitted to the issuers data processing centre. The issuer generates an authentication parameter (TAP) based upon its stored version of KP and PIN and a time variant parameter received from the terminal. The TAP is then returned to the terminal in a response message, and based upon an imputed PIN, partial processing of the input PIN and KP on the card a derived TAP is compared with the received TAP in the terminal. A correct comparison indicating that the entered PIN is valid. The request message includes the PAN encoded under the KS and KS encoded under a cross-domain key. Message authentication codes (MAC) are attached to message and the correct reception and regeneration of a MAC on a message including a term encoded under KS indicates that the received KS is valid and that the message originated at a valid terminal or card.

24 citations


Book ChapterDOI
01 Jan 1984
TL;DR: In many data communication applications it is desirable to be able to prove receipt and authenticity of a transmitted document, andipherment techniques are available which make this possible.
Abstract: In many data communication applications it is desirable to be able to prove receipt and authenticity of a transmitted document. Encipherment techniques are available which make this possible. The paper gives an outline of the principles involved.

1 citations


Book ChapterDOI
09 Apr 1984
TL;DR: This paper proposes a non linear time varying encryption algorithm, based on key layering in three levels (system key, intermediate key, running key) and on encryption organization into two or more sets of three operations (running key rotation, message digit substitution and transposition).
Abstract: To perform message authentication in a telesurveillance system, the paper proposes a non linear time varying encryption algorithm, based on key layering in three levels (system key, intermediate key, running key) and on encryption organization into two or more sets of three operations (running key rotation, message digit substitution and transposition). The algorithm was designed to be implemented on an 8-bit microprocessor.

Book ChapterDOI
01 Jan 1984
TL;DR: This paper traces the development of data encipherment in the public domain, examining the available algorithms, and discusses the way in which standards for applications of dataencipherment are developing.
Abstract: This paper traces the development of data encipherment in the public domain, examining the available algorithms, and discusses the way in which standards for applications of data encipherment are developing. It also serves as an introduction to the two associated papers on key management and data signature.