Generating cryptographic checksums

An encryption verification and generator technology, applied in encryption devices with shift registers/memory, user identity/authority verification, transmission systems, etc., can solve problems such as database space consumption, and achieve the effect of less storage space

Active Publication Date: 2017-05-17
TELEFON AB LM ERICSSON (PUBL)
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Maintaining a database of irreducible polynomials is space consuming since the number of irreducible po

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generating cryptographic checksums
  • Generating cryptographic checksums
  • Generating cryptographic checksums

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which specific embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are given by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.

[0048] exist figure 1 In , a communication system 100 is shown comprising a sender 101 and a receiver 102 configured to communicate over a communication network 103 . Specifically, sender 101 is configured to send message 105 and receiver 102 is configured to receive message 105 . Preferably, the sender 101 and the receiver 102 are configured to send and receive messages. The sender 101 and the receiver 102 may be any type of device capable of communicating through the communi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method (500) of generating a cryptographic checksum for a message M(x) is provided. The method comprises pseudo-randomly selecting (502) at least two irreducible polynomials p i (x). Each irreducible polynomial p i (x) is selected based on a first cryptographic key from the set of irreducible polynomials of degree ni over a Galois Field. The method further comprises calculating (503) a generator polynomial p(x) of degree n = formula (I) as a product of the N irreducible polynomials formula (II), and calculating (505) the cryptographic checksum as a first function g of a division of a second function of M(x), (M(x)), modulo p(x), i.e., g( (M(x)) mod p(x)). By replacing a standard checksum, such as a Cyclic Redundancy Check (CRC), with a cryptographic checksum, an efficient message authentication is provided. The proposed cryptographic checksum may be used for providing integrity assurance on the message, i.e., for detecting random and intentional message changes, with a known level of security. Further, a corresponding computer program, a corresponding computer program product, and a checksum generator for generating a cryptographic checksum, are provided.

Description

technical field [0001] The invention relates to a method of generating a cryptographic checksum, a corresponding computer program, a corresponding computer program product and a checksum generator for generating a cryptographic checksum. Background technique [0002] Current third generation (3G) and fourth generation (4G) 3rd Generation Partnership Project (3GPP) mobile networks typically use encryption as well as authentication in the control plane, while the user plane is only protected by encryption. On the other hand, WiMAX and Wireless Local Area Network (WLAN) / WiFi networks also use authentication for the user plane. [0003] A known way of securing user plane messaging is to use authentication tags, which are created by applying a cryptographic hash function to the message, such as a Keyed Cryptographic Hash Message Authentication Code (HMAC) or a Cipher Block Chaining Message Authentication Code (CBC-MAC). )) and generated. A cryptographic hash function is a hash ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L1/00H04L9/06
CPCH04L1/0061H04L9/0643H04L9/3242H04L2209/34G06F7/724
Inventor 马茨·尼斯伦埃琳娜·杜波罗瓦古兰·塞兰德弗雷德里克·林德奎斯特
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products