Skip to main content

Part of the book series: UNITEXT ((UNITEXTINF))

  • 696 Accesses

Riassunto

Nei Capitoli 5 e 6 abbiamo introdotto le tecniche crittografiche che permettono di proteggere la confidenzialità dei messaggi scambiati in un arbitrario scenario di comunicazione. Come abbiamo già anticipato nel Paragrafo 1.1, questo non è l’unico requisito da soddisfare nel contesto di comunicazione sicura.

Sii quel che sembri essere. Oppure, se vuoi metterla più semplicemente: Non immaginarti mai di non essere altrimenti da quello che potrebbe apparire agli altri che ciò che fosti o potresti essere stato non fosse altrimenti da quello che eri stato sarebbe apparso ad essi essere altrimenti. Lewis Carroll, Le Avventure di Alice nel Paese delle Meraviglie [Car65]

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Letture consigliate

  1. ANSI. American national standard for financial institution message authentication (wholesale). ANSI X9.9. 1981.

    Google Scholar 

  2. Mihir Bellare, Ran Canetti e Hugo Krawczyk. “Keying Hash Functions for Message Authentication”. In: CRYPTO. 1996, pp. 1–15.

    Google Scholar 

  3. Mihir Bellare, Roch Guérin e Phillip Rogaway. XOR MACs: New Methods for Message Authentication Using Block Ciphers. Rapp. tecn. RC 19970. IBM Research Report, mar. 1995.

    Google Scholar 

  4. Mihir Bellare, Tadayoshi Kohno e Chanathip Namprempre. “Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm”. In: ACM Trans. Inf. Syst. Secur. 7.2 (2004), pp. 206–241.

    Article  Google Scholar 

  5. Mihir Bellare, Tadayoshi Kohno e Chanathip Namprempre. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC 4344. http://www.ietf.org/rfc/rfc4344.txt. 2006.

    Google Scholar 

  6. Mihir Bellare, Joe Kilian e Phillip Rogaway. “The Security of the Cipher Block Chaining Message Authentication Code”. In: J. Comput. Syst. Sci. 61.3 (2000), pp. 362–399.

    Article  MathSciNet  Google Scholar 

  7. Mihir Bellare e Chanathip Namprempre. “Authenticated Encryption: Relations lations among Notions and Analysis of the Generic Composition Paradigm”. In: J. Cryptology 21.4 (2008), pp. 469–491.

    Article  MathSciNet  Google Scholar 

  8. Mihir Bellare, Krzysztof Pietrzak e Phillip Rogaway. “Improved Security Analyses for CBC MACs”. In: Advances in Cryptology — CRYPTO’ 05. Vol. 3621. Lecture Notes in Computer Science. Springer-Verlag, ago. 2005, pp. 527–545.

    Google Scholar 

  9. Lewis Carroll. Alice’s Adventures in Wonderland. Edizione Italiana Einaudi. Traduzione di Alessandro Ceni. Mac Millan & Co., 1865.

    Google Scholar 

  10. Danny Dolev, Cynthia Dwork e Moni Naor. “Non-Malleable Cryptography”. In: SIAM J. Comput. 30.2 (2000), pp. 391–437.

    Article  MathSciNet  Google Scholar 

  11. Niels Ferguson e Bruce Schneier. Practical Cryptography. John Wiley & Sons, 2003.

    Google Scholar 

  12. Oded Goldreich, Shafi Goldwasser e Silvio Micali. “On the Cryptographic Applications of Random Functions”. In: CRYPTO. 1984, pp. 276–288.

    Google Scholar 

  13. Oded Goldreich. Foundations of Cryptography, Vol. 2: Basic Applications. Cambridge University Press, 2001.

    Google Scholar 

  14. ISO. Data cryptographic techniques — data integrity mechanism using a cryptographic check function employing a block cipher algorithm. ISO/IEC 9797. 1989.

    Google Scholar 

  15. Hugo Krawczyk. “The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)” In: CRYPTO. 2001, pp. 310–331.

    Google Scholar 

  16. Ueli M. Maurer. “Indistinguishability of Random Systems”. In: EUROCRYPT. 2002, pp. 110–132.

    Google Scholar 

  17. NIST. The keyed-hash message authentication code (HMAC). Federal Infomation Processing Standard (FIPS). 2002.

    Google Scholar 

  18. Erez Petrank e Charles Rackoff. “CBC MAC for Real-Time Data Sources”. In: J. Cryptology 13.3 (2000), pp. 315–338.

    Article  MathSciNet  Google Scholar 

  19. Kenneth G. Paterson e Gaven J. Watson. “Plaintext-Dependent Decryption A Formal Security Treatment of SSH-CTR”. In: EUROCRYPT. 2010, pp. 345–361.

    Google Scholar 

  20. Douglas R. Stinson. Cryptography: Theory and Practice. CRC Press, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Italia

About this chapter

Cite this chapter

Venturi, D. (2012). Tecniche simmetriche di integrità. In: Crittografia nel Paese delle Meraviglie. UNITEXT(). Springer, Milano. https://doi.org/10.1007/978-88-470-2481-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-88-470-2481-6_7

  • Publisher Name: Springer, Milano

  • Print ISBN: 978-88-470-2480-9

  • Online ISBN: 978-88-470-2481-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics