IL203260A - Mac code verification without disclosure - Google Patents
Mac code verification without disclosureInfo
- Publication number
- IL203260A IL203260A IL203260A IL20326010A IL203260A IL 203260 A IL203260 A IL 203260A IL 203260 A IL203260 A IL 203260A IL 20326010 A IL20326010 A IL 20326010A IL 203260 A IL203260 A IL 203260A
- Authority
- IL
- Israel
- Prior art keywords
- mac
- message
- disclosure
- code
- code verification
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a verification of the authenticity of a message (M) transmitted by a transmitting unit (95) to a receiver unit (96) with a cryptographic redundancy corresponding to a message authentification code (MAC) calculated from a block encryption. According to the invention, instead of verifying the code (MAC) received with the message (M) on reception,An initialisation vector (IV) value is deduced from the received code (MAC) which is compared with a previously stored reference value (IV).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0705095A FR2918830B1 (en) | 2007-07-13 | 2007-07-13 | MAC CODE VERIFICATION WITHOUT REVELATION. |
PCT/FR2008/051278 WO2009013420A1 (en) | 2007-07-13 | 2008-07-08 | Verification of mac code without disclosure |
Publications (1)
Publication Number | Publication Date |
---|---|
IL203260A true IL203260A (en) | 2013-09-30 |
Family
ID=39226935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IL203260A IL203260A (en) | 2007-07-13 | 2010-01-12 | Mac code verification without disclosure |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP2168304B1 (en) |
ES (1) | ES2724703T3 (en) |
FR (1) | FR2918830B1 (en) |
IL (1) | IL203260A (en) |
PL (1) | PL2168304T3 (en) |
RU (1) | RU2457624C2 (en) |
TW (1) | TWI492602B (en) |
WO (1) | WO2009013420A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9202015B2 (en) | 2009-12-31 | 2015-12-01 | Intel Corporation | Entering a secured computing environment using multiple authenticated code modules |
WO2014154236A1 (en) * | 2013-03-25 | 2014-10-02 | Irdeto B.V. | Obtaining or providing key data |
CN104683093B (en) * | 2013-11-27 | 2018-01-26 | 财团法人资讯工业策进会 | Have block encryption device, block encryption method, block decryption device and the block decryption method of integrity verification concurrently |
JP2017517818A (en) | 2014-06-12 | 2017-06-29 | トムソン ライセンシングThomson Licensing | Method and system for processing the color of a digital image |
EP3154218A1 (en) | 2015-10-06 | 2017-04-12 | Thomson Licensing | Device and method for discontinuous hashing of digital data |
CN107026872B (en) * | 2017-05-17 | 2021-02-12 | 宁波潮涌道投资合伙企业(有限合伙) | Method for preventing user personal information from being decoded |
FR3068560B1 (en) | 2017-06-28 | 2019-08-23 | Viaccess | METHOD FOR RECEIVING AND DETECTING A CRYPTOGRAM OF A CONTROL WORD |
DE102021005213A1 (en) | 2021-10-19 | 2023-04-20 | Mercedes-Benz Group AG | Method for generating a u-bit fingerprint and method for encrypting plain text |
DE102022004632B3 (en) | 2022-12-12 | 2024-03-21 | Mercedes-Benz Group AG | Method for encrypting plain text |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
MY131509A (en) * | 1999-03-15 | 2007-08-30 | Sony Corp | Data processing method, apparatus and system for encrypted- data transfer |
US7428305B1 (en) * | 2000-05-02 | 2008-09-23 | Qualcomm Incorporated | Generation of keyed integer permutations for message authentication codes |
US7046802B2 (en) * | 2000-10-12 | 2006-05-16 | Rogaway Phillip W | Method and apparatus for facilitating efficient authenticated encryption |
US20030041242A1 (en) * | 2001-05-11 | 2003-02-27 | Sarver Patel | Message authentication system and method |
US6948067B2 (en) * | 2002-07-24 | 2005-09-20 | Qualcomm, Inc. | Efficient encryption and authentication for data processing systems |
US7336783B2 (en) * | 2003-01-24 | 2008-02-26 | Samsung Electronics, C., Ltd. | Cryptographic systems and methods supporting multiple modes |
GB0309161D0 (en) * | 2003-04-23 | 2003-05-28 | Hewlett Packard Development Co | Cryptographic method and apparatus |
US7457409B2 (en) * | 2004-06-09 | 2008-11-25 | Mediatek Inc. | System and method for performing secure communications in a wireless local area network |
-
2007
- 2007-07-13 FR FR0705095A patent/FR2918830B1/en not_active Expired - Fee Related
-
2008
- 2008-07-08 EP EP08826503.8A patent/EP2168304B1/en active Active
- 2008-07-08 PL PL08826503T patent/PL2168304T3/en unknown
- 2008-07-08 RU RU2010105036/08A patent/RU2457624C2/en active
- 2008-07-08 ES ES08826503T patent/ES2724703T3/en active Active
- 2008-07-08 WO PCT/FR2008/051278 patent/WO2009013420A1/en active Application Filing
- 2008-07-11 TW TW097126364A patent/TWI492602B/en not_active IP Right Cessation
-
2010
- 2010-01-12 IL IL203260A patent/IL203260A/en active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
WO2009013420A1 (en) | 2009-01-29 |
EP2168304A1 (en) | 2010-03-31 |
EP2168304B1 (en) | 2019-02-20 |
FR2918830B1 (en) | 2009-10-30 |
RU2010105036A (en) | 2011-08-20 |
PL2168304T3 (en) | 2019-09-30 |
RU2457624C2 (en) | 2012-07-27 |
TW200910900A (en) | 2009-03-01 |
ES2724703T3 (en) | 2019-09-13 |
FR2918830A1 (en) | 2009-01-16 |
TWI492602B (en) | 2015-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL203260A (en) | Mac code verification without disclosure | |
JP6684967B2 (en) | Method, sender and receiver for authentication and integrity protection of message content | |
CN111435934B (en) | Key derivation scheme for data frame transmission in ultra wideband ranging | |
WO2007041178A3 (en) | Quantum key distribution system | |
CN106330856B (en) | Hearing device and method of communication of a hearing device | |
WO2008087734A1 (en) | Cryptogram generating device, cryptogram communication system, and group parameter generating device | |
WO2007127576A3 (en) | Method for elliptic curve public key cryptographic validation | |
WO2008099756A1 (en) | Client device, key device, service providing device, user authentication system, user authentication method, program, and recording medium | |
RU2012141285A (en) | METHOD FOR ENSURING TIME AND POSITION WITH AUTHENTICITY CHECK | |
US20140105396A1 (en) | Addressable radio device | |
RU2015118109A (en) | Wireless communication system | |
WO2010107684A3 (en) | Handheld multiple role electronic authenticator and its service system | |
TW200746773A (en) | Security considerations for the LTE of UMTS | |
RU2012101495A (en) | SYSTEMS, METHODS AND DEVICES FOR DETECTING AND CORRECTING ENCRYPTION ERRORS | |
EA200602160A1 (en) | METHOD OF ENCRYPTION AND TRANSMISSION OF DATA BETWEEN THE SENDER AND THE RECIPIENT USING THE NETWORK | |
WO2011006575A3 (en) | Prevention of masquerade by using identification sequences | |
JP2019140577A5 (en) | ||
JP2011120051A5 (en) | ||
EP2394452A4 (en) | Apparatuses and a method for protecting a bootstrap message in a network | |
CN102006303A (en) | Method and terminal for increasing data transmission safety by using multi-encryption method | |
KR20150068471A (en) | Addressable radio device | |
CN101931536A (en) | Method for encrypting and authenticating efficient data without authentication center | |
PL2529359T3 (en) | Method for DSRC communication | |
EP1755268A3 (en) | Transmission/reception system, transmission/reception method, receiver device, reception method and program for encrypted and non encrypted data | |
CN102598575A (en) | Method and system for the accelerated decryption of cryptographically protected user data units |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FF | Patent granted | ||
KB | Patent renewed | ||
KB | Patent renewed | ||
KB | Patent renewed |