AU7028298A - Method and arrangement for forming and checking a checksum for digital data which are grouped into a number of data segments - Google Patents

Method and arrangement for forming and checking a checksum for digital data which are grouped into a number of data segments Download PDF

Info

Publication number
AU7028298A
AU7028298A AU70282/98A AU7028298A AU7028298A AU 7028298 A AU7028298 A AU 7028298A AU 70282/98 A AU70282/98 A AU 70282/98A AU 7028298 A AU7028298 A AU 7028298A AU 7028298 A AU7028298 A AU 7028298A
Authority
AU
Australia
Prior art keywords
checksum
commutative
segment
data
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU70282/98A
Other versions
AU723002B2 (en
Inventor
Martina Hanck
Gerhard Hoffmann
Klaus Lukas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Callahan Cellular LLC
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Publication of AU7028298A publication Critical patent/AU7028298A/en
Application granted granted Critical
Publication of AU723002B2 publication Critical patent/AU723002B2/en
Assigned to PRASENDT INVESTMENTS, LLC reassignment PRASENDT INVESTMENTS, LLC Alteration of Name(s) in Register under S187 Assignors: SIEMENS AKTIENGESELLSCHAFT
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Description

GR 97 P 1472 - 1 - Foreign version Description Method and arrangement for forming and checking a 5 checksum for digital data which are grouped into a number of data segments In digital communications, i.e. during the exchange of digital data, it is frequently desirable to 10 protect the transmission of the electronic data with respect to the most varied aspects. A very significant aspect is the protection of the digital data to be transmitted against unauthorized modification, the so-called protection of the integrity 15 of the data. As a protection against unauthorized modification of digital data, the so-called cryptographic checksum, for example the digital signature, is known from [1] . The method described in 20 [1] is based on forming a hashing value from the digital user data and the subsequent cryptographic processing of the hashing value by means of a cryptographic key. The result is a cryptographic checksum. To check the integrity, a corresponding 25 cryptographic key is used for performing the inverse cryptographic operation on the checksum formed and the result is compared with the hashing value again calculated from the user data. The integrity of the user data is ensured when the hashing values are 30 matched. This previously customary procedure necessitates that the complete user data must be present on the receiver side in the identical order in which they were present when the hashing value was 35 formed since otherwise the formation of the hashing value leads to an errored value. In digital communications, however, it is frequently customary to subdivide and to transmit the user data to be transmitted in relatively small data segments which are U-i GR 97 P 1472 - la - Foreign version also called data packets, due to protocol boundary conditions.
GR 97 P 1472 - 2 - Foreign version The data segments are frequently not tied to a defined order or it is not possible to guarantee a defined sequential arrival of the data segments. In the method from [1], it is therefore required for the complete 5 user data to be reassembled again on the receiver side, that is to say after the transmission of the data segments, in the order in which they were originally sent. The data to be transmitted can only be verified in this order. However, this frequently means 10 considerable additional expenditure for the flow control of the data segments inasmuch as this is possible at all within the framework of the protocol used. From [2], commutative operations are known. In 15 [2], a general definition for commutative operations is also specified. Illustratively, a commutative operation can be understood to be an operation in which the order of individual operations is unimportant and each order of individual operation always leads to the same total 20 operation. A commutative operation can be, for example, an EXOR operation, an additive operation or also a multiplicative operation. From [3], a method and a device for generating check code segments for the occurrence of source data 25 and for determining errors in the source data are known. The invention is thus based on the object of specifying methods and arrangements for forming and checking a first commutative checksum for digital data 30 which are grouped into a number of data segments, in which a flow control for the individual data segments is no longer required. The object is achieved by the method according to Claim 1, by the method according to Claim 2, by the 35 method according to Claim 3, by the arrangement according to Claim GR 97 P 1472 - 3 - Foreign version 11, by the arrangement according to Claim 12 and by the arrangement according to Claim 13. In the method according to Clai 4 1, a first segment checksum is formed for each data segment for 5 digital data which are grouped into a number of' data segments. The first segment checks s formed are combined by a commutative operation to form a first commutative checksum. In the method according Ao Claim 2, a 10 predetermined first commutative checksum, which is allocated to digital data which are grouped into a number of data segments, is checked. This is done by a second segment checksum being formed for each data segment and a second commutative checksum being formed 15 by a commutative operation on the second segment checksum. The second commutative checksum and the first commutative checksum are checked for a match. In the method according to Claim 3 for forming and checking a first commutative checksum for digital 20 data which is grouped into data segments, a first segment checksum is formed for each data segment and the first data checksums are combined by a commutative operation to form a first commutative checksum. For each data segment of the digital data to which the 25 first commutative checksum is allocated, second segment checksums are formed and a second commutative checksum is formed by commutative operation on the second segment checksums. The second commutative checksum and the first commutative checksum are checked for a match. 30 The arrangement according to Claim 11 exhibits an arithmetic and logic unit which is arranged in such a manner that a segment checksum is formed for each data segment and that the first commutative checksum is formed by a commutative operation on the segment 35 checksums.
GR 97 P 1472 - 4 - Foreign version The arrangement according to Claim 12 exhibits an arithmetic and logic unit which is arranged in such a manner that a second segment checksum is formed for each data segment, a second commutative checksum is 5 formed by a commutative operation on the' second segment checksums, and the second commutative checksum (KP2) is checked for a match with the first commutative checksum (KP1). The arrangement according to Claim 13 exhibits 10 an arithmetic and logic unit which is arranged in such a manner that the following method steps are performed: a) a segment checksum is formed for each data segment, b) the first commutative checksum is formed by a commutative operation on the segment checksums, 15 c) a second segment checksum is formed for each data segment of the digital data to which the first commutative checksum is allocated, d) a 'second commutative checksum is formed by a commutative operation on the second segment checksums, 20 and e) the second commutative checksum is checked for a match with the first commutative checksum. A considerable advantage of the methods and of the arrangements can be seen in the fact that, by using 25 a commutative operation for individual checksums of the data segments, a flow control for the order of the individual data segments is no longer required. Furthermore, it is no longer required to reassemble the complete user data in the original order 30 in which the first commutative checksums were formed. The order of the individual data segments is no longer of significance in the formation of the commutative checksum.
GR 97 P 1472 - 5 - Foreign version If the digital data are transmitted between two arrangements, a further advantage of the methods can be seen in the fact that the checking of the integrity can already be begun before all data segments have been 5 received since it is no longer required to maintain the original order in forming the first checksum. This leads to a timesaving in the checking of the integrity of the data. Illustratively, the invention can be seen in 10 the fact that a checksum is formed in the case of a number of data segments which, together, form the data to be protected, and the individual checksums of the data segments are commutatively combined with one another. 15 Advantageous further developments of the invention are obtained from the dependent claims. It is advantageous to protect the first commutative checksum cryptographically by using at least one cryptographic operation. 20 The result of this further development is that the cryptographic security of the data is considerably increased. A cryptographic operation in this sense is, for example, the encrypting of the first commutative checksum with a symmetric or also with an assymetric 25 encryption method which forms a cryptographic checksum. On the receiver side, the inverse cryptographic method to the cryptographic method is performed in order to ensure cryptographic security. To form a checksum within the context of the 30 document, various possibilities are known: - a chi9cksum can be formed by forming hashing values for the individual data segments; GR 97 P 1472 - 6 - Foreign version - the checksums can also be formed by so-called cyclic codes (Cyclic Redundancy Check, CRC); - a cryptographic one-way function can also be used for forming the checksums for the data segments. 5 The methods can be advantageously used in various application scenarios. The methods can be used both in the transmission of digital data for protection against manipulation of the data, and in the archiving of 10 digital data in a computer in which the first commutative checksum is formed and stored together with the data to be archived. The first commutative checksum can be checked when the digital data are loaded from the archive memory in order to detect any manipulation 15 of the archived data. The method can be advantageously used for protecting digital data, the data segments of which are not tied to an order. Examples of such data segments are packet-oriented communication protocols, for 20 example network management protocols such as the Simple Network Management Protocol (SNMP) or the Common Management Information Protocol (CMIP). In the text which follows, an illustrative embodiment of the invention will be explained in 25 greater detail with reference to a Figure. Even if the illustrative embodiment is explained with reference to the Simple Network Management Protocol (SNMP) in the text which follows, this does not represent any restriction on the applicability of the method. The 30 method can be used whenever it is of importance to ensure integrity protection for digital data which are grouped into a number of data segments. ALU C
)
GR 97 P 1472 - 7 - Foreign version The Figure shows two arrangements, data segments being transmitted from the first arrangement to the second arrangement. In the Figure, a first computer arrangement Al, 5 in which data segments (Di, i = 1 .. n) are stored, is shown symbolically. The data segments Di together form the digital data which are also designated as user data, for which it is of importance to ensure their integrity. 10 Both the first computer arrangement Al and a second computer arrangement A2 described in the text which follows in each case contain an arithmetic and logic unit R which is arranged in such a manner that the method steps described in the text which follows 15 are performed. In the first arrangement Al, the data segments Di are arranged at positions Pi within the total data stream. For each data segment Di, a first segment checksum PSi is [lacuna] by using a checksum function 20 PSF. The individual first segment checksum PSi are combined to form a first commutative checksum KP1 by a commutative operation as defined and described in [2]. The commutative operation on the individual checksums PSi are shown symbolically by an EXOR symbol ( in the 25 Figure. The first commutative checksum KP1 is subjected to a cryptographic method, a symmetric or asymmetric method, by using a first cryptographic key S (step 101) . The result of the cryptographic operation is a 30 cryptographic checksum KP. Both the data segments Di and the cryptographic checksum KP are transmitted by a transmission medium, preferably a line or also a logical connection which is symbolically shown by a communication link UM in the 35 Figure, wU GR 97 P 1472 - 8 - Foreign version to a second arrangement A2 where they are received. The crossing arrows of the data segments Di in the Figure indicate that, due to the transmission of the data segments Di, these are received in positions 5 Pj (j = a .. z) which are displaced compared with the order in the first arrangement Al. Thus, a data segment D2 at the first position P1 is received as data segment Da in the second arrangement A2. Data segment Dl is received as data 10 segment Dc in the second arrangement. Data segment Dn is received as received data segment Db at the second position P2 in the second arrangement A2. In accordance with the method used, either the first cryptographic key S is used for performing the 15 inverse cryptographic operation on the cryptographic checksum KP if a symmetric encryption method is used, or a second cryptographic key S' is used if an asymmetric cryptographic method is used. The result of the inverse cryptographic 20 operation (step 102) is again the first commutative checksum KP1 with correct encryption and decryption. This checksum is stored in the second arrangement A2. For the comparison of the data segments Dj, which are now received in permutated order compared 25 with the original order during the formation of the first commutative checksum KP1, second segment checksums Psj are formed for the received data segments Dj, again using the same checksum methods PSF. ALj GR 97 P 1472 - 9 - Foreign version The resultant second checksums PSj are again commutatively combined with one another to form a second commutative checksum KP2. In a further step 103, a check is made whether 5 the first commutative checksum KP1 matches the second commutative checksum KP2. If this is so, the integrity of the data segments Di, and thus the integrity of all the digital data, is ensured (step 104) if the cryptographic 10 methods used or, respectively, the methods used for forming checksums ensure the corresponding cryptographic security. If the first cryptographic checksum KP1 does not match the second cryptographic checksum KP2, the 15 integrity of the data segments Di would be violated and a manipulation of the data is found and preferably reported to a user of the system. The protocol data units (PDU) in SNMP are structured in such a manner that the user information 20 (so-called variable bindings) can contain a list of objects (object indicators, OID/value pairs). The order of the objects within a PDU is not specified so that it is possible for a permutation of the objects to occur during the transmission of the PDUs between the first 25 arrangement Al and the second arrangement A2. The invention now makes it possible to form a single cryptographic checksum over all objects of an SNMP PDU without having to take into consideration the order of the objects or of the PDUs. 30 In the text which follows, alternatives to the illustrative embodiment described above will be explained. wA~ GR 97 P 1472 - 10 - Foreign version The method for forming the checksum PSF can be, for example, a method for forming hashing values. However, methods for forming cyclic codes (Cyclic Redundancy Check, CRC) using feedback-type shift 5 registers can also be used. In addition, cryptographic one-way functions can be used for forming the checksums PSi and, respectively, Psj. Furthermore, the commutative operation can have the additional property of associativity. 10 Both the method for forming the checksum and the method for checking a checksum can be performed independently of one another. However, the method for forming the checksum and the method for checking the checksum can also be performed jointly. 15 Furthermore, it is provided not to transmit digital data but to archive the digital data, that is to say to store them in the first arrangement Al, together with the first commutative checksum KP1. When the archived data are reused, that is to say when the 20 data segments Di are loaded from the memory of the first arrangement Al, the method for checking the first commutative checksum KP1 as described above will then be performed. The first arrangement Al and the second arrangement A2 can thus be identical. 25 Illustratively, the invention can be seen in that in the case of a number of data segments which, together, represent the data to be protected, a checksum is formed for each data segment and the individual checksums of the data segments are 30 commutatively combined with one another. This makes it possible to form and to check a checksum without having to take into consideration the order of the data segments.
LJJ
GR 97 P 1472 - 11 - Foreign version In this document, the following publications have been quoted: [1] W. Stallings, Sicherheit in Netzwerk und Internet (Security in Network and Internet), Prentice Hall, 5 ISBN 3-930436-29-9, pp. 203-223, 1995 [2] K.-H. Kiyek and F. Schwarz, Mathmatik fir Informatiker (Mathematics for Computer Scientists), Teubner Verlag, ISBN 3-519-03277-X, pp. 11-13, 1989 10 [3] DE-A 2 048 365
LU

Claims (20)

1. Method for forming a first commutative checksum 5 (KP1) for digital data which are grouped into a number of data segments (Di, i = 1 .. n), by a computer, a) in which a segment checksum (PSi) is formed for each data segment (Di), and b) in which the first commutative checksum (KP1) is 10 formed by a commutative operation (D) on the segment checksums (PSi).
2. Method for checking a predetermined first commutative checksum (KP1) which is allocated to digital data which are grouped into a number of data 15 segments, by a computer, a) in which a second segment checksum (PSj) is formed for each data segment (Dj, j = a .. z), b) in which a second commutative checksum (KP2) is formed by a commutative operation (@) on the second 20 segment checksums (Psj), and c) in which the second commutative checksum (KP2) is checked for a match with the first commutative checksum (KPl).
3. Method for forming and checking a first 25 commutative checksum (KPl) for digital data which are grouped into a number of data segments (Di, i = 1 n), by a computer, a) in which a segment checksum (PSi) is formed for each data segment (Di), 30 b) in which the first commutative checksum (KPl) is formed by a commutative operation (E) on the segment checksums (PSi), c) in which a second segment checksum (PSj) is formed for each data segment (Dj, j = a .. z) of the digital 35 data to which the first commutative checksum (KP1) is allocated, GR 97 P 1472 - 13 - Foreign version d) in which a second commutative checksum (KP2) is formed by a commutative operation (E) on the second segment checksums (Psj), and e) in which the second commutative checksum (KP2) is 5 checked for a match with the first commutative checksum (KP1).
4. Method according to one of Claims 1 to 3, in which the segment checksums (Psi, Psj) are formed in accordance with at least one of the following types: 10 - forming a hashing value, - forming CRC codes, - using at least one cryptographic one-way function.
5. Method according to one of Claims 1 to 4, in which the first commutative checksum (KP1) is 15 cryptographically protected by using at least one cryptographic operation.
6. Method according to Claim 5, in which the cryptographic operation is a symmetric cryptographic method. 20
7. Method according to Claim 5, in which the cryptographic operation is an asymmetric cryptographic method.
8. Method according to one of Claims 1 to 7, in which the commutative operation (S) exhibits the 25 property of associativity.
9. Method according to one of Claims 1 to 8, in which digital data are protected, the data segments (Di) of which are not tied to an order. GR 97 P 1472 - 14 - Foreign version
10. Method according to one of Claims 1 to 8, in which digital data are protected which are processed in accordance with a network management protocol.
11. Arrangement for forming a first commutative 5 checksum (KP1) for digital data which are grouped into a number of data segments (Di, i = 1 .. n), by ,means of an arithmetic and logic unit which is arranged in such a manner that a) a segment checksum (PSi) is formed for each data 10 segment (Di), and b) the first commutative checksum (KPl) is formed by a commutative operation (E) on the segment checksum (Psi).
12. Arrangement for checking a predetermined first 15 commutative checksum (KPl) which is allocated to digital data which are grouped into a number of data segments, by means of an arithmetic and logic unit which is arranged in such a manner that a) a second segment checksum (Psj) is formed for each 20 data segment (Dj, j = a .. z), b) a second commutative checksum (KP2) formed by a commutative operation (E) on the second segment checksum (Psj), and c) the second commutative checksum (KP2) is checked 25 for a match with the first commutative checksum (KP1).
13. Arrangement for forming and checking a first commutative checksum (KP1) for digital data which is grouped into a number of data segments (Di, i = 1 . . n) , by means of at least one arithmetic and logic unit 30 which is arranged in such a manner that a) a segment checksum (PSi) is formed for each data segment (Di), b) the first commutative checksum (KP1) is formed by a commutative operation (E) on the segment checksums 35 (Psi), GR 97 P 1472 - 15 - Foreign version c) a second segment checksum (PSj) is formed for each data segment (Dj, j = a . . z) of the digital data to which the first commutative checksum (K#1) is all'bcated, 5 d) a second commutative checksum (KP2) is formed by a commutative operation (®) on the second segment checksums (Psj), and e) the second commutative checksum (KP2) is checked for a match with the first commutative checksum (KP1). 10
14. Arrangement according to one of Claims 11 to 13, in which the arithmetic and logic unit is arranged in such a manner that the segment checksums (Psi, Psj) are formed in accordance with at least one of the following types: 15 - forming a hashing value, - forming CRC codes, - using at least one-cryptographic one-way function.
15. Arrangement according to one of Claims 11 to 14, in which the arithmetic and logic unit is arranged 20 in such a manner that the first commutative checksum (KP1) is cryptographically protected using at least one cryptographic operation.
16. Arrangement according to Claim 15, in which the arithmeti and logic unit is arranged in such a manner 25 that the cryptographic operation is a symmetric cryptographic method.
17. Arrangement according to Claim 15, in which the arithmetic anc logic unit is arranged in such a manner that the cryptographic operation is an asymmetric 30 cryptographic )method.
18. Arrangement according to one of Claims 11 to 17, GR 97 P 1472 - 16 - Foreign version in which the arithmetic and logic unit is arranged in such a manner that the commutative operation .(@) exhibits the property of associativity.
19. Arrangement according to one of Claims 11 to 5 18, in which the arithmetic and logic unit is set up in such a manner that the digital data are protected, the data segments (Di) of which are not tied to an order.
20. Arrangement according to one of Claims 11 to 18, in which the arithmetic and logic unit is arranged 10 in such a manner that the digital data. are protected which are processed in accordance with a network management protocol.
AU70282/98A 1997-04-14 1998-02-25 Method and arrangement for forming and checking a checksum for digital data which are grouped into a number of data segments Ceased AU723002B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19715486 1997-04-14
DE19715486 1997-04-14
PCT/DE1998/000563 WO1998047264A1 (en) 1997-04-14 1998-02-25 Method and system for producing and checking a hash total for digital data grouped in several data segments

Publications (2)

Publication Number Publication Date
AU7028298A true AU7028298A (en) 1998-11-11
AU723002B2 AU723002B2 (en) 2000-08-17

Family

ID=7826436

Family Applications (1)

Application Number Title Priority Date Filing Date
AU70282/98A Ceased AU723002B2 (en) 1997-04-14 1998-02-25 Method and arrangement for forming and checking a checksum for digital data which are grouped into a number of data segments

Country Status (7)

Country Link
EP (1) EP0976221B1 (en)
JP (1) JP2000513115A (en)
AU (1) AU723002B2 (en)
DE (1) DE59811203D1 (en)
ES (1) ES2219883T3 (en)
ID (1) ID22750A (en)
WO (1) WO1998047264A1 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7089213B2 (en) * 2002-06-04 2006-08-08 Bottomline Technologies System and method for producing and verifying secure negotiable instruments
US7058612B2 (en) * 2002-06-04 2006-06-06 Bottomline Technologies, (De) Inc. System and method for producing and verifying secure negotiable instruments
US7133844B2 (en) * 2002-06-04 2006-11-07 Bottomline Technologies (De) Inc. System and method for producing and verifying secure negotiable instruments
JPWO2005093594A1 (en) * 2004-03-26 2008-02-14 株式会社三技協 Authentication system
US7065650B2 (en) * 2004-05-10 2006-06-20 Aladdin Knowledge Systems Ltd. Method for indicating the integrity of a collection of digital objects
EP1643336A1 (en) * 2004-09-30 2006-04-05 Siemens Aktiengesellschaft Clear product identification
US8204216B2 (en) 2006-10-23 2012-06-19 Alcatel Lucent Processing method for message integrity with tolerance for non-sequential arrival of message data
US8949600B2 (en) * 2006-10-27 2015-02-03 Qualcomm Incorporated Composed message authentication code
CN101542962B (en) * 2006-11-21 2013-11-06 朗讯科技公司 Processing method for message integrity with tolerance for non-sequential arrival of message data
US9880983B2 (en) * 2013-06-04 2018-01-30 X1 Discovery, Inc. Methods and systems for uniquely identifying digital content for eDiscovery
US10346550B1 (en) 2014-08-28 2019-07-09 X1 Discovery, Inc. Methods and systems for searching and indexing virtual environments
JP5802892B1 (en) * 2014-11-12 2015-11-04 オプテックス株式会社 Method for generating message authentication code of communication packet and authentication method
DE102015218373B4 (en) * 2015-09-24 2017-05-04 Siemens Aktiengesellschaft Monitor an integrity of a test record
AT518910B1 (en) * 2016-08-04 2018-10-15 Ait Austrian Inst Tech Gmbh Method for checking the availability and integrity of a distributed data object
WO2018134925A1 (en) * 2017-01-18 2018-07-26 富士通株式会社 Data transmission/reception method, data transmission device, data reception device, data transmission program, data reception program, and data transmission/reception system
EP3737109B1 (en) * 2019-05-08 2024-03-20 Getac Holdings Corporation Verification code generation method, data verification method and electronic device
US11330345B2 (en) 2019-05-09 2022-05-10 Getac Technology Corporation Verification code generation method, data verification method and electronic device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0609595B1 (en) * 1993-02-05 1998-08-12 Hewlett-Packard Company Method and apparatus for verifying CRC codes by combination of partial CRC codes
US5757913A (en) * 1993-04-23 1998-05-26 International Business Machines Corporation Method and apparatus for data authentication in a data communication environment
US5475826A (en) * 1993-11-19 1995-12-12 Fischer; Addison M. Method for protecting a volatile file using a single hash

Also Published As

Publication number Publication date
WO1998047264A1 (en) 1998-10-22
JP2000513115A (en) 2000-10-03
ES2219883T3 (en) 2004-12-01
ID22750A (en) 1999-12-09
DE59811203D1 (en) 2004-05-19
EP0976221B1 (en) 2004-04-14
AU723002B2 (en) 2000-08-17
EP0976221A1 (en) 2000-02-02

Similar Documents

Publication Publication Date Title
AU723002B2 (en) Method and arrangement for forming and checking a checksum for digital data which are grouped into a number of data segments
Preneel et al. On the security of iterated message authentication codes
US7171552B1 (en) Encrypting information in a communications network
US7675867B1 (en) One-way data transfer system with built-in data verification mechanism
US6167515A (en) Method and system for performing the transmission of private data over a public network
CN110505193B (en) Authentication encryption for vehicle against random number abuse
EP3468147B1 (en) Method for constructing secure hash functions from bit-mixers
CN102124680B (en) The method and apparatus of the integrity protection of the data of transmission over networks
US20160149696A1 (en) Transparent Serial Encryption
US20100241859A1 (en) Mode of information transmission and complex protection
US10009357B2 (en) Data frame for protected data transmissions
EP1615370B1 (en) Authentication of short messages
US7103822B2 (en) Method and apparatus for computing ‘N-bit at a time’ CRC's of data frames of lengths not multiple of N
US8122247B2 (en) Processing method for message integrity with tolerance for non-sequential arrival of message data
Biryukov et al. Cryptanalysis of the “kindle” cipher
Pannetrat et al. Authenticating real time packet streams and multicasts
KR19990053174A (en) How to Check Integrity of Information Using Hash Function
Boscher et al. Masking does not protect against differential fault attacks
CN114844728B (en) Serialized data secure communication method and big data platform
EP3364593B1 (en) Masking storage transfer to protect against attacks
WO2001084772A2 (en) Generation of keyed integer permutations for message authentication codes
Benmocha et al. Unintended features of APIs: cryptanalysis of incremental HMAC
Ankele et al. MergeMAC: a MAC for authentication with strict time constraints and limited bandwidth
EP3396896A1 (en) Efficient calculation of message authentication codes for related data
JP2019041228A (en) Electronic control equipment

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)