Showing papers on "Message authentication code published in 1990"
••
08 Jan 1990TL;DR: The LOKI primitive may be used in any mode of operation currently defined for ISO DEA-1, with which it is interface compatible, and two modes of operation which compute a 64-bit and 128-bit, Message Authentication Code (or hash value).
Abstract: This paper provides an overview of the LOKI encryption primitive which may be used to encrypt and decrypt a 64-bit block of data using a 64-bit key. The LOKI primitive may be used in any mode of operation currently defined for ISO DEA-1, with which it is interface compatible [AAAA83]. Also described are two modes of operation of the LOKI primitive which compute a 64-bit, and 128-bit, Message Authentication Code (or hash value). These modes of operation may be used to provide authentication of a communications session, or of data files.
125 citations
••
03 Dec 1990TL;DR: A description is given of the application of formal specification and verification methods to two microprocessor-based cryptographic devices: a 'smart token' system that controls access to a network of workstations, and a message authentication device implementing the ANSI X9.9 message authentication standard.
Abstract: A description is given of the application of formal specification and verification methods to two microprocessor-based cryptographic devices: a 'smart token' system that controls access to a network of workstations, and a message authentication device implementing the ANSI X9.9 message authentication standard. Formal specification and verification were found to be practical, cost-effective tools for detecting potential security weaknesses, and helped to significantly strengthen the security of the access control system. >
15 citations
••
TL;DR: A critical analysis of the modified cryptographic checksum algorithm published by F. Cohen and H.J. Huang points out two major weaknesses in the scheme: a reduced dependency on the beginning of the plaintext and an adaptive chosen text attack.
8 citations
••
01 Jan 1990TL;DR: The paper reviews some of the history of ideas to do with capabilities and of implementations based on them, and concludes with a discussion of some current manifestations of the same general outlook.
Abstract: The paper reviews some of the history of ideas to do with capabilities and of implementations based on them, and concludes with a discussion of some current manifestations of the same general outlook.
4 citations
••
08 Jan 1990TL;DR: Motivated by Brickell's ideas, this work considers authentication systems with splitting and the problems of reducing the message space.
Abstract: Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent's chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell's ideas we consider authentication systems with splitting and the problems of reducing the message space.
4 citations
••
08 Jan 1990TL;DR: As Electronic Funds Transfer at Point of Sale (EFT/POS) systems expand and the need for more secure key management is recognised, it becomes desirable to develop secure remote initialisation strategies for terminals across public data networks.
Abstract: As Electronic Funds Transfer at Point of Sale (EFT/POS) systems expand and the need for more secure key management is recognised, it becomes desirable to develop secure remote initialisation strategies for terminals across public data networks.
1 citations
••
08 Jan 1990TL;DR: This paper will discuss initial authentication of user and host using asymmetric ciphers and continuous re-authentication to assure channel integrity in all comunication modes.
Abstract: CONFIDENTIALITY, INTEGRITY, and AVAILABILITY are the three faces of information security These goals can all be achieved by use of cryptography This paper will discuss:
1
Initial authentication of user and host using:
(a)
asymmetric ciphers; or
(b)
symmetric ciphers
2
Exchange of cryptographic keys for:
(a)
privacy transformation; and
(b)
message authentication
3
Continuous re-authentication to:
(a)
test user and host presence; and
(b)
assure channel integrity
4
Implementation in all comunication modes:
(a)
two-party (one-to-one);
(b)
broadcast (one-to-many); and
(c)
conference (many-to-many)