Skip to main content

Message Authentication Codes (MACs)

  • Chapter
  • First Online:
Kryptografie verständlich

Part of the book series: eXamen.press ((EXAMEN))

  • 23k Accesses

Zusammenfassung

In diesem Kapitel erlernen Sie

  • das Prinzip von MAC,

  • Sicherheitseigenschaften von MAC,

  • die Realisierung von MAC mithilfe von Hash-Funktionen und Blockchiffren.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 39.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Literatur

  1. ANSI X9.17-1985, American National Standard X9.17: Financial Institution Key Management (1985)

    Google Scholar 

  2. Mihir Bellare, Ran Canetti, Hugo Krawczyk, Keying Hash Functions for Message Authentication, in CRYPTO ’96: Proceedings of the 16th Annual International Cryptology Conference, Advances in Cryptology (Springer, 1996), S. 1–15

    Google Scholar 

  3. Mihir Bellare, Ran Canetti, Hugo Krawczyk, Message Authentication using Hash Functions – The HMAC Construction. Cryptobytes 2 (1996)

    Google Scholar 

  4. J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway, UMAC: Fast and secure message authentication, in CRYPTO ’99: Proceedings of the 19th Annual International Cryptology Conference, Advances in Cryptology (Springer, 1999), S. 216–233

    Google Scholar 

  5. C. M. Campbell, Design and specification of cryptographic capabilities. NBS Special Publication 500-27: Computer Security and the Data Encryption Standard (U.S. Department of Commerce, National Bureau of Standards, 1977), S. 54–66

    Google Scholar 

  6. J.L. Carter, M.N. Wegman, New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22(3), 265–277 (1981)

    Article  MathSciNet  MATH  Google Scholar 

  7. Morris Dworkin, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality (2004), http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf. Zugegriffen am 1. April 2016

  8. Morris Dworkin, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38D (2005), http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf. Zugegriffen am 1. April 2016

  9. Morris Dworkin, Recommendation for Block Cipher Modes of Operation: Galois Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D (2007), http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf. Zugegriffen am 1. April 2016

  10. S. Halevi, H. Krawczyk, MMH: message authentication in software in the Gbit/second rates, in Proceedings of the 4th Workshop on Fast Software Encryption. LNCS, Bd. 1267 (Springer, 1997), S. 172–189

    Chapter  Google Scholar 

  11. D. McGrew, J. Viega, RFC 4543: The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. Technical report (Corporation for National Research Initiatives, Internet Engineering Task Force, Network Working Group, 2006), http://rfc.net/rfc4543.html. Zugegriffen am 1. April 2016

  12. J.H. Song, R. Poovendran, J. Lee, T. Iwata, RFC 4493: The AES-CMAC Algorithm. Technical report (Corporation for National Research Initiatives, Internet Engineering Task Force, Network Working Group, 2006), http://rfc.net/rfc4493.html. Zugegriffen am 1. April 2016

  13. NIST Special Publication SP800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC (2007), http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf. Zugegriffen am 1. April 2016

  14. D. Whiting, R. Housley, N. Ferguson, RFC 3610: Counter with CBC-MAC (CCM). Technical report (Corporation for National Research Initiatives, Internet Engineering Task Force, Network Working Group, 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Pelzl .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Pelzl, J., Paar, C. (2016). Message Authentication Codes (MACs). In: Kryptografie verständlich. eXamen.press. Springer Vieweg, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49297-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49297-0_12

  • Published:

  • Publisher Name: Springer Vieweg, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49296-3

  • Online ISBN: 978-3-662-49297-0

  • eBook Packages: Computer Science and Engineering (German Language)

Publish with us

Policies and ethics