AEC: A Practical Scheme for Authentication with Error Correction

作者: Abhrajit Sengupta , Dhiman Saha , Shamit Ghosh , Deval Mehta , Dipanwita Roy Chowdhury

DOI: 10.1007/978-3-319-12060-7_11

关键词: Computer engineeringComputer securityScheme (programming language)AuthenticationCellular automatonMessage authentication codeLimit (mathematics)Error detection and correctionThroughput (business)Computer scienceField-programmable gate array

摘要: We present a Message Authentication Code (MAC) with integrated error correction capability, called AEC. The MAC itself can detect/correct errors upto certain limit and provides an estimate of the number location errors. security AEC lies in random selection underlying correcting code (ECC). In this work, we propose new on-the-fly solution to problem ECC selection, making it highly secure. Moreover, combined simple regular structure Cellular Automata (CA) based ECC, makes suitable for efficient hardware implementation. Detailed FPGA implementations both standalone compact variants AEC, are presented on Spartan-3 platform. implementation has low area footprint high throughput particularly resource constrained applications. To best our knowledge is only practical design ECC-MAC scheme.

参考文章(15)
Santanu Chattopadhyay, Sukumar Nandi, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri, Additive Cellular Automata: Theory and Applications ,(1997)
Dipanwita Roy Chowdhury, Jaydeb Bhaumik, NMIX: AN IDEAL CANDIDATE FOR KEY MIXING international conference on security and cryptography. pp. 285- 288 ,(2009)
Solomon W. Golomb, Shift register sequences ,(1981)
Hugo Krawczyk, LFSR-based Hashing and Authentication international cryptology conference. pp. 129- 139 ,(1994) , 10.1007/3-540-48658-5_15
Jaydeb Bhaumik, Dipanwita Roy Chowdhury, An Integrated ECC-MAC Based on RS Code trans. computational science. ,vol. 4, pp. 117- 135 ,(2009) , 10.1007/978-3-642-01004-0_7
Maurice Mignotte, Mathematics for computer algebra ,(1991)
Stephen Wolfram, Random sequence generation by cellular automata Advances in Applied Mathematics. ,vol. 7, pp. 123- 169 ,(1986) , 10.1016/0196-8858(86)90028-X
Michael O. Rabin, Probabilistic Algorithms in Finite Fields SIAM Journal on Computing. ,vol. 9, pp. 273- 280 ,(1980) , 10.1137/0209024
Yu Liu, Charles Boncelet, The CRC–NTMAC for Noisy Message Authentication IEEE Transactions on Information Forensics and Security. ,vol. 1, pp. 517- 523 ,(2006) , 10.1109/TIFS.2006.885027
C.G. Boncelet, The NTMAC for authentication of noisy messages IEEE Transactions on Information Forensics and Security. ,vol. 1, pp. 35- 42 ,(2006) , 10.1109/TIFS.2005.863506