The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
우리는 해시함수와 블록암호를 순서대로 결합한 MAC 방식을 제안한다. 우리는 해시 함수와 블록 암호 사이의 중간 해시 값이 추가적인 랜덤 비트에 의해 유출되는 문제를 방지하기 위해 이 방식을 강화합니다. 사용되는 해시 함수에 대한 요구 사항은 느슨합니다. 제안된 방식의 보안은 기본 블록 암호에 크게 의존합니다. 이 체계는 긴 메시지를 처리하기 위한 소프트웨어 구현에 효율적이며 명확한 보안 속성을 가지고 있습니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Yi-Shiung YEH, Chan-Chi WANG, "Construct Message Authentication Code with One-Way Hash Functions and Block Ciphers" in IEICE TRANSACTIONS on Fundamentals,
vol. E82-A, no. 2, pp. 390-393, February 1999, doi: .
Abstract: We suggest an MAC scheme which combines a hash function and an block cipher in order. We strengthen this scheme to prevent the problem of leaking the intermediate hash value between the hash function and the block cipher by additional random bits. The requirements to the used hash function are loosely. Security of the proposed scheme is heavily dependent on the underlying block cipher. This scheme is efficient on software implementation for processing long messages and has clear security properties.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e82-a_2_390/_p
부
@ARTICLE{e82-a_2_390,
author={Yi-Shiung YEH, Chan-Chi WANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Construct Message Authentication Code with One-Way Hash Functions and Block Ciphers},
year={1999},
volume={E82-A},
number={2},
pages={390-393},
abstract={We suggest an MAC scheme which combines a hash function and an block cipher in order. We strengthen this scheme to prevent the problem of leaking the intermediate hash value between the hash function and the block cipher by additional random bits. The requirements to the used hash function are loosely. Security of the proposed scheme is heavily dependent on the underlying block cipher. This scheme is efficient on software implementation for processing long messages and has clear security properties.},
keywords={},
doi={},
ISSN={},
month={February},}
부
TY - JOUR
TI - Construct Message Authentication Code with One-Way Hash Functions and Block Ciphers
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 390
EP - 393
AU - Yi-Shiung YEH
AU - Chan-Chi WANG
PY - 1999
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E82-A
IS - 2
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - February 1999
AB - We suggest an MAC scheme which combines a hash function and an block cipher in order. We strengthen this scheme to prevent the problem of leaking the intermediate hash value between the hash function and the block cipher by additional random bits. The requirements to the used hash function are loosely. Security of the proposed scheme is heavily dependent on the underlying block cipher. This scheme is efficient on software implementation for processing long messages and has clear security properties.
ER -