Skip to main content

Undetectable Manipulation of CRC Checksums for Communication and Data Storage

  • Conference paper
  • 358 Accesses

Part of the Communications in Computer and Information Science book series (CCIS,volume 26)

Abstract

The Cyclic Redundancy Check (CRC) is an efficient and widespread coding method to detect random errors in industrial and business data transmission. Because of its simple implementation and low residual error probability, it is also ap plied to data stored in digital memory. If no error occurred then the checksum (FCS, Frame Check Sequence) is consistent to the original data. Additionally, the actual value of the FCS is often used as a crite rion for e.g. the correct ver sion of the software in digital memories or to detect its manipulation. Although it is well known that data protected by CRC can be manipulated undetectably, CRC is applied for the detection of manipulations but not random errors. The paper demonstrates and proves in detail how easily data, like business software or video streams, can be manipulated such that the manipulation is not detectable even for CRC of high order.

Keywords

  • Cyclic Redundancy Check
  • checksum
  • manipulation
  • data transmission
  • data storage

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-00205-2_13

This is a preview of subscription content, access via your institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   42.79
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   52.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Peterson, W., Weldon, E.J.: Error Correcting Codes. MIT Press, Cambridge (1996)

    MATH  Google Scholar 

  2. MacWilliams, F.J., Sloane, N.J.: Theory of Error-Correcting Codes. North-Holland, Amsterdam (1991)

    MATH  Google Scholar 

  3. Blahut, R.E.: Algebraic Codes for Data Transmission. Cambridge University Press, Cambridge (2003)

    CrossRef  MATH  Google Scholar 

  4. Schiller, F., Mattes, T.: An Efficient Method to Evaluate CRC-Polynomials for Safety Critical Industrial Communication. Journ. of Appl. Computer Science 14, 57–80 (2006)

    Google Scholar 

  5. Koopman, P., Chakravarty, T.: Cyclic Redundancy Code (CRC) Polynomial Selection for Embedded Networks. In: DSN 2004, Florence, Italy, pp. 145–154 (2004)

    Google Scholar 

  6. Castagnoli, G.: On the Minimum Distance of Long Cyclic Codes and Cyclic Redundancy-Check Codes, ETH Zurich, Diss. No. 8979 (1989)

    Google Scholar 

  7. Schiller, F., Mattes, T.: Analysis of CRC-Polynomials for Safety-Critical Communication by Deterministic and Stochastic Automata, SAFEPROCESS, Beijing, China, pp. 1003–1008 (2006)

    Google Scholar 

  8. Wikipedia (2008), http://en.wikipedia.org/wiki/Cyclic_redundancy_check

  9. Williams, R.N.: A Painless Guide to CRC Error Detection Algorithms. Rocksoft Pty Ltd., Hazelwood Park (1993)

    Google Scholar 

  10. International Electrotechnical Commission: IEC 61131-3, edn. 2.0 (2003)

    Google Scholar 

  11. Menezes, J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)

    MATH  Google Scholar 

  12. Bellare, M., Rogaway, P.: Introduction to Modern Cryptography. Univ. of California (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schiller, F., Mattes, T., Weber, U., Mattes, R. (2009). Undetectable Manipulation of CRC Checksums for Communication and Data Storage. In: Bond, P. (eds) Communications and Networking in China. Chinacombiz 2008. Communications in Computer and Information Science, vol 26. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00205-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00205-2_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00204-5

  • Online ISBN: 978-3-642-00205-2

  • eBook Packages: Computer ScienceComputer Science (R0)