Zusammenfassung
In diesem Kapitel erlernen Sie
-
das Prinzip von MAC,
-
Sicherheitseigenschaften von MAC,
-
die Realisierung von MAC mithilfe von Hash-Funktionen und Blockchiffren.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Literatur
ANSI X9.17-1985, American National Standard X9.17: Financial Institution Key Management (1985)
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Keying Hash Functions for Message Authentication, in CRYPTO ’96: Proceedings of the 16th Annual International Cryptology Conference, Advances in Cryptology (Springer, 1996), S. 1–15
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Message Authentication using Hash Functions – The HMAC Construction. Cryptobytes 2 (1996)
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway, UMAC: Fast and secure message authentication, in CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference, Advances in Cryptology (Springer, 1999), S. 216–233
C. M. Campbell, Design and specification of cryptographic capabilities. NBS Special Publication 500-27: Computer Security and the Data Encryption Standard (U.S. Department of Commerce, National Bureau of Standards, 1977), S. 54–66
J.L. Carter, M.N. Wegman, New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22(3), 265–277 (1981)
Morris Dworkin, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality (2004), http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf. Zugegriffen am 1. April 2016
Morris Dworkin, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38D (2005), http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf. Zugegriffen am 1. April 2016
Morris Dworkin, Recommendation for Block Cipher Modes of Operation: Galois Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D (2007), http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf. Zugegriffen am 1. April 2016
S. Halevi, H. Krawczyk, MMH: message authentication in software in the Gbit/second rates, in Proceedings of the 4th Workshop on Fast Software Encryption. LNCS, Bd. 1267 (Springer, 1997), S. 172–189
D. McGrew, J. Viega, RFC 4543: The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. Technical report (Corporation for National Research Initiatives, Internet Engineering Task Force, Network Working Group, 2006), http://rfc.net/rfc4543.html. Zugegriffen am 1. April 2016
J.H. Song, R. Poovendran, J. Lee, T. Iwata, RFC 4493: The AES-CMAC Algorithm. Technical report (Corporation for National Research Initiatives, Internet Engineering Task Force, Network Working Group, 2006), http://rfc.net/rfc4493.html. Zugegriffen am 1. April 2016
NIST Special Publication SP800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC (2007), http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf. Zugegriffen am 1. April 2016
D. Whiting, R. Housley, N. Ferguson, RFC 3610: Counter with CBC-MAC (CCM). Technical report (Corporation for National Research Initiatives, Internet Engineering Task Force, Network Working Group, 2003)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Pelzl, J., Paar, C. (2016). Message Authentication Codes (MACs). In: Kryptografie verständlich. eXamen.press. Springer Vieweg, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49297-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-49297-0_12
Published:
Publisher Name: Springer Vieweg, Berlin, Heidelberg
Print ISBN: 978-3-662-49296-3
Online ISBN: 978-3-662-49297-0
eBook Packages: Computer Science and Engineering (German Language)