scispace - formally typeset
Search or ask a question

Showing papers on "Message authentication code published in 1990"


Book ChapterDOI
08 Jan 1990
TL;DR: The LOKI primitive may be used in any mode of operation currently defined for ISO DEA-1, with which it is interface compatible, and two modes of operation which compute a 64-bit and 128-bit, Message Authentication Code (or hash value).
Abstract: This paper provides an overview of the LOKI encryption primitive which may be used to encrypt and decrypt a 64-bit block of data using a 64-bit key. The LOKI primitive may be used in any mode of operation currently defined for ISO DEA-1, with which it is interface compatible [AAAA83]. Also described are two modes of operation of the LOKI primitive which compute a 64-bit, and 128-bit, Message Authentication Code (or hash value). These modes of operation may be used to provide authentication of a communications session, or of data files.

125 citations


Proceedings ArticleDOI
D.R. Kuhn1, J.F. Dray1
03 Dec 1990
TL;DR: A description is given of the application of formal specification and verification methods to two microprocessor-based cryptographic devices: a 'smart token' system that controls access to a network of workstations, and a message authentication device implementing the ANSI X9.9 message authentication standard.
Abstract: A description is given of the application of formal specification and verification methods to two microprocessor-based cryptographic devices: a 'smart token' system that controls access to a network of workstations, and a message authentication device implementing the ANSI X9.9 message authentication standard. Formal specification and verification were found to be practical, cost-effective tools for detecting potential security weaknesses, and helped to significantly strengthen the security of the access control system. >

15 citations


Journal ArticleDOI
TL;DR: A critical analysis of the modified cryptographic checksum algorithm published by F. Cohen and H.J. Huang points out two major weaknesses in the scheme: a reduced dependency on the beginning of the plaintext and an adaptive chosen text attack.

8 citations


Book ChapterDOI
01 Jan 1990
TL;DR: The paper reviews some of the history of ideas to do with capabilities and of implementations based on them, and concludes with a discussion of some current manifestations of the same general outlook.
Abstract: The paper reviews some of the history of ideas to do with capabilities and of implementations based on them, and concludes with a discussion of some current manifestations of the same general outlook.

4 citations


Book ChapterDOI
08 Jan 1990
TL;DR: Motivated by Brickell's ideas, this work considers authentication systems with splitting and the problems of reducing the message space.
Abstract: Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent's chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell's ideas we consider authentication systems with splitting and the problems of reducing the message space.

4 citations


Book ChapterDOI
08 Jan 1990
TL;DR: As Electronic Funds Transfer at Point of Sale (EFT/POS) systems expand and the need for more secure key management is recognised, it becomes desirable to develop secure remote initialisation strategies for terminals across public data networks.
Abstract: As Electronic Funds Transfer at Point of Sale (EFT/POS) systems expand and the need for more secure key management is recognised, it becomes desirable to develop secure remote initialisation strategies for terminals across public data networks.

1 citations


Book ChapterDOI
08 Jan 1990
TL;DR: This paper will discuss initial authentication of user and host using asymmetric ciphers and continuous re-authentication to assure channel integrity in all comunication modes.
Abstract: CONFIDENTIALITY, INTEGRITY, and AVAILABILITY are the three faces of information security These goals can all be achieved by use of cryptography This paper will discuss: 1 Initial authentication of user and host using: (a) asymmetric ciphers; or (b) symmetric ciphers 2 Exchange of cryptographic keys for: (a) privacy transformation; and (b) message authentication 3 Continuous re-authentication to: (a) test user and host presence; and (b) assure channel integrity 4 Implementation in all comunication modes: (a) two-party (one-to-one); (b) broadcast (one-to-many); and (c) conference (many-to-many)