Method for generating a cipher-based message authentication code

A message authentication code and message technology, applied in the field of generating password-based message authentication code

Active Publication Date: 2011-07-13
NXP BV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this point, the attacker cannot proceed without overcoming considerable difficulty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating a cipher-based message authentication code
  • Method for generating a cipher-based message authentication code
  • Method for generating a cipher-based message authentication code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] already discussed in the background figure 1 and 2 .

[0041] Figure 3-5 A potential differential power attack on a CMAC that has been computed according to the method of the present invention is shown.

[0042] For the example embodiment, the state array 25 used to compute the CMAC is obtained as described in the Background. The state array 25 consists of four rows 31-34 and four columns 41-44. Additionally, the messages on which the state array 25 is based are as figure 1 The single-block message represented by state array 1 is shown.

[0043] For the example embodiment, the CMAC is computed by reserving the bytes 29, 30 of two of the four rows 31-34 of the state array 25. Bytes from the remaining lines are discarded. For the example shown, keep Figure 3-5 Bytes 29, 30 of lines 32 and 34 shown shaded in , and the remaining bytes of lines 31, 33 are discarded. Therefore, the even-numbered bytes of the state array 25 are reserved for computing the CMAC of thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In a method for generating a cipher-based message authentication code, a state array (25) comprised of rows (31-34) of bytes (S'0-S'15) and columns (41-44) of bytes (S'0-S'15) based on a message to be transmitted is generated. The cipher-based message authentication code is generated by retaining the bytes (29, 30) of at least one row (32, 34) of the state array (25).

Description

technical field [0001] The present invention relates to a method for generating a password-based message authentication code. Background technique [0002] A Message Authentication Code (MAC) is a piece of information used to authenticate a message. The input to the algorithm that generates the MAC is the secret key and the message to be authenticated. Cipher-based MAC (CMAC) is a block cipher-based message authentication code and is described, for example, in NIST (National Institute of Standards and Technology) Special Publication 800-38B, May 2005. [0003] A CMAC associated with a message is constructed by dividing the message into blocks of size equal to the block size of the underlying cipher, e.g. 128 bits in the case of Advanced Encryption Standard (AES), encrypting the message with Cipher Block Chaining (CBC) ( The last block is padded if necessary), and the encrypted result of the last block (in whole or in part) is retained as the calculated MAC value. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/0643H04L2209/24H04L9/0631H04L2209/12H04L9/06H04L9/32
Inventor 布鲁斯·默里马蒂亚斯·瓦格纳
Owner NXP BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products