Advertisement

An Improved Poly1305 MAC

  • Dayin Wang
  • Dongdai Lin
  • Wenling Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3989)

Abstract

In this paper, we propose an improved Poly1305 MAC, called IPMAC. IPMAC is a refinement of Poly1305 MAC shown by Bernstein. We use only one 16-byte key and one 16-byte nonce for IPMAC while Poly1305 MAC uses two 16-byte keys and one 16-byte nonce, 48-byte in total. The cost of reducing the size of secret keys is almost negligible: only one encryption. Similarly to Poly1305 MAC, our algorithm correctly and efficiently handles messages of arbitrary bit length.

Keywords

Hash Function Random Function Message Authentication Code Security Proof Hash Family 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bernstein, D.J.: The Poly1305-AES Message-Authentication Code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 32–49. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Goldwasser, S., Bellare, M.: Lecture Notes on Cryptograhpy, http://www-cse.ucsd.edu/users/mihir
  3. 3.
    Carter, J., Wegman, M.: Universal classes of hash functions. Journal of Computer and System Sciences 18, 143–154 (1979)MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Stinson, D.R.: Universal hashing and authentication codes. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 74–85. Springer, Heidelberg (1992)Google Scholar
  5. 5.
    Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129–139. Springer, Heidelberg (1994)Google Scholar
  6. 6.
    Stinson, D.: On the connection between universal hashing, combinatorial designs and error-correcting codes. In: Proc. Congressus Numerantium, vol. 114, pp. 7–27 (1996)Google Scholar
  7. 7.
    J. Black.: Message Authentication Codes, http://www.cs.colorado.edu/~jrblack
  8. 8.
    Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code, http://www.cs.ucdavis.edu/~rogaway

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dayin Wang
    • 1
  • Dongdai Lin
    • 1
  • Wenling Wu
    • 1
  1. 1.Key Laboratory of Information Security, Institute of Software, Chinese Academy of SciencesBeijingChina

Personalised recommendations