Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher

A message verification code and message technology, which is applied in the field of AC as a stream cipher, and can solve the problem that it cannot be calculated in parallel.

Inactive Publication Date: 2008-06-18
奈福克斯有限公司
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The above-mentioned MAC generation method using stream ciphers proposed by Jae-woo HAN et al. ha...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher
  • Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher
  • Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Hereinafter, exemplary embodiments of the present invention will be described in detail. However, the present invention is not limited to the embodiments described below, but can be implemented in various forms. The following examples are described in order to enable those skilled in the art to embody and practice the invention.

[0028] FIG. 1 is a block diagram of a message authentication code (MAC) generator 300 for generating a MAC that can be computed in parallel using a stream cipher according to an exemplary embodiment of the present invention. The process of generating a MAC in the MAC generator 300 will be described step by step below.

[0029] 1. Divide the input message M into a number of n-bit message blocks. The message block consists of m 1 21,...,m k 23 to represent. When each message block m 1 21,...,m k When the length of 23 is not a multiple of n, 100...0 is added to each message block to make the length of each message block a multiple of n.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided are a method of generating a Message Authentication Code (MAC) using a stream cipher, and authentication/encryption and authentication/decryption methods using a stream cipher. According to the methods, authentication/encryption is performed using a MAC generated using a stream cipher as an initialization vector of the stream cipher. Therefore, it is unnecessary to use a random number generation algorithm to generate the initialization vector, and thus implementation efficiency can be improved. In addition, upon generation of a MAC, a plurality of key stream generators perform computation for a plurality of message blocks, respectively. Therefore, the message blocks are computed in parallel at a time, and thus computation efficiency is excellent.

Description

[0001] Cross References to Related Applications [0002] This application claims the priority and benefit of Korean Patent No. 2006-111862 filed on November 13, 2006 and Korean Patent No. 2007-81305 filed on August 13, 2007, the disclosures of which are hereby incorporated by reference in their entirety Include. technical field [0003] The present invention relates to a method of generating a Message Authentication Code (MAC) using a stream cipher and a method of verification / encryption and verification / decryption using a stream cipher, and more particularly, the present invention relates to using a secure and efficient stream cipher to generate a MAC capable of being computed in parallel and authentication / encryption and authentication / decryption methods using a stream cipher and using a MAC as an initialization vector for the stream cipher. Background technique [0004] MAC is used to provide data integrity. When data has been sent or stored, data integrity can be check...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/18H04L1/00
CPCH04L9/0643H04L9/065H04L9/3242
Inventor 金宇焕李定根
Owner 奈福克斯有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products