WO1997032417A1 - Verfahren zum generieren eines prüfworts für eine bitfolge zur überprüfung der integrität und authentizität der bitfolge - Google Patents
Verfahren zum generieren eines prüfworts für eine bitfolge zur überprüfung der integrität und authentizität der bitfolge Download PDFInfo
- Publication number
- WO1997032417A1 WO1997032417A1 PCT/EP1997/001021 EP9701021W WO9732417A1 WO 1997032417 A1 WO1997032417 A1 WO 1997032417A1 EP 9701021 W EP9701021 W EP 9701021W WO 9732417 A1 WO9732417 A1 WO 9732417A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- word
- data
- bit sequence
- linked
- words
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Definitions
- the invention relates to a method for generating a test word for a bit sequence for checking the integrity and authenticity of the bit sequence, the bit sequence having at least one data record which consists of a plurality of data words, each of which has the same word lengths defined by a number of bits.
- This method is referred to below as the message digest method, the message digest being the check word.
- the invention further relates to a method for sending bit sequences with integrity / authenticity assurance by means of a message digest generated according to the above method.
- message digest methods are not aimed at secrecy, but are used to ensure the integrity of data.
- a cryptographic hash function is usually applied to a data record of a bit sequence, a message digest being calculated from the data and a secret key, ie (only) known to the sender and the receiver, also referred to as "seed".
- a secret key ie (only) known to the sender and the receiver
- the recipient can determine whether the data has been modified without authentication (authenticity check). To do this, the recipient calculates the message digest with the same seed and checks whether this newly calculated digest matches the one sent.
- An attacker can modify the data, but generally cannot calculate a digest that matches the data because the secret key (seed) is not known to him.
- Standard methods for generating a message digest include N-hash, MD5 (Rivest 1992) and SHA (Metzger and Simpson 1995).
- the invention has for its object to provide a very fast and sufficiently secure message digest method, which is particularly suitable for large amounts or flows of data.
- the invention proposes a method for generating a test word for a bit sequence for checking the integrity and authenticity of the bit sequence, the bit sequence having at least one data record which consists of a plurality of data words, the same in each case by one Number of bits have defined word lengths, and wherein a random number is generated for each data word that has the same number of bits as the data words, first and second operand pairs are formed, each consisting of a data word and a random number, the data word and the random number each first pair of operands are subjected to a first linking operation, the data word and the random number of every second pair of operands are subjected to a second linking operation and the results of all operations applied to the first and the second pair of operands are linked, the result of this linking being the check word of the data record.
- the ⁇ words are combined with random numbers, preferably by means of simple operations such as modulo 2 w place Iän ge _ addition an d / or the modulo-2 multiplication word length.
- the order in which these operations take place and in which the random numbers are combined with the data words result from the secret key.
- This key expediently also contains information about the generation of the random numbers.
- bitwise exclusive-OR operation can also be applied to the operands of the pairs of operands.
- the generation of the check word becomes safer against attacks if the results of all operations applied to the first and the second operands are linked alternately by a first link operation and a second link operation.
- the bit sequence has a plurality of data records, each with the same number of data words, and that the random numbers with which the data words of the first and the second operand pairs one Linked record, are the same for each record.
- the order of the random numbers in which they are linked to the data words of the first and second pairs of operands is changed per data record.
- test words which result for the individual data sets are linked to one another, the link between the test words being changeable from test word to test word and / or the link being a modulo-2 word length addition, a modulo-2 word length -Multiplication and / or a bitwise exclusive-OR operation.
- the link is preferably selected such that the check word of a data record of the bit sequence is linked according to a first combination operation with a first combination word of the same length as the check word and the result of this first combination operation according to a second combination operation with a second combination word of the same length as the result the first combination operation is linked and the result of the second combination operation is linked to the check word of the next data record of the bit sequence.
- the first combination operation is in particular a modulo 2 word length multiplication, while the second combination operation is a modulo 2 word length addition.
- bit sequences sent can be checked for authenticity.
- the sender sends the bit sequence (message) and the test word.
- the recipient is aware of the generation of the test word on the basis of the data words of the bit sequence; this information is the content of the key, which the recipient must know in addition to the sender.
- the recipient can now generate the test word and compare it with the received test word. Only if both check words are the same can the recipient assume that the message is authentic.
- Ri is a sequence of random or quasi-random numbers. + denotes here and in the following the addition modulo 2 "(for ⁇ -bit words), ⁇ bitwise exclusive orn (Xor) (corresponds to the addition modulo 1).
- This method is safe if ir together with the R x is a so-called one-time key that is only known to the sender and the recipient and is only used once.
- One-off keys cannot be used in practice for obvious reasons, as they are too complex and too long. Instead, the transmitter sends encrypted parameters for a pseudo-random number generator. For performance reasons, however, this must be very simple, e.g.
- R n (k +1 ) Rn (k + 1) -1 XX + 0 0
- + and x addition and multiplication denote modulo 2 ⁇
- ⁇ is the word length of the data words of the bit sequence in bits
- 1 is the number of data records of the message
- n is the number of data words per data record.
- the indices 0 to n-1 are permuted and this sequence is repeated every n words, that is to say for each data block.
- n + 3 tuple (X, Y, Z, ⁇ i) is used as the seed here.
- the sender sends the triple per message (C (X, Y, Z, ⁇ x ), m, D).
- C denotes any symmetrical or asymmetrical encryption function that encrypts the seed. Attacking C is a standard problem in cryptography. Since the plaintext (X, Y, Z, ⁇ J can be chosen randomly by the sender and only the key text C (X, Y, Z, ⁇ J is visible, known-plaintext and given-plaintext attacks are not possible. The rest remains pure ciphertext attack, which, however, has little chance of success because the plaintext is random.
- the transmitter transfers a superseed tuple (Si) to the receiver in encrypted form. Both use this as the input parameter of a better random generator, which in turn then calculates the actual seeds (X, Y, Z, ⁇ J.
- the Sj tuple therefore needs to be selected and sent very rarely than direct seeds (X, Y, Z, ⁇ J .
- This method cannot also be applied in several stages, for example by sending T x , which are then used to calculate several S 1 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Error Detection And Correction (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/945,592 US6044488A (en) | 1996-02-29 | 1997-02-28 | Process for generating a check word for a bit sequence for verifying the integrity and authenticity of the bit sequence |
DE19780129T DE19780129D2 (de) | 1996-02-29 | 1997-02-28 | Verfahren zum Generieren eines Prüfworts für eine Bitfolge zur Überprüfung der Integrität und Authentizität der Bitfolge |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19607580 | 1996-02-29 | ||
DE19607580.7 | 1996-02-29 | ||
DE19608663.9 | 1996-03-06 | ||
DE19608663 | 1996-03-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1997032417A1 true WO1997032417A1 (de) | 1997-09-04 |
Family
ID=26023314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1997/001021 WO1997032417A1 (de) | 1996-02-29 | 1997-02-28 | Verfahren zum generieren eines prüfworts für eine bitfolge zur überprüfung der integrität und authentizität der bitfolge |
Country Status (3)
Country | Link |
---|---|
US (1) | US6044488A (de) |
DE (1) | DE19780129D2 (de) |
WO (1) | WO1997032417A1 (de) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7424667B2 (en) * | 2005-08-30 | 2008-09-09 | Inventec Corporation | Digital data transmission error checking method and system |
US8856960B2 (en) | 2012-02-09 | 2014-10-07 | Alcatel Lucent | Data leakage prevention for cloud and enterprise networks |
CN113328523A (zh) * | 2021-05-31 | 2021-08-31 | 广东电网有限责任公司 | 电力开关管理方法、装置、设备及存储介质 |
CN113328521A (zh) * | 2021-05-31 | 2021-08-31 | 广东电网有限责任公司 | 电力开关状态的边缘处理方法、装置、设备及存储介质 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0449716A1 (de) * | 1990-03-26 | 1991-10-02 | France Telecom | Einrichtung zur Kondensation von digitalen Daten |
-
1997
- 1997-02-28 DE DE19780129T patent/DE19780129D2/de not_active Expired - Lifetime
- 1997-02-28 US US08/945,592 patent/US6044488A/en not_active Expired - Fee Related
- 1997-02-28 WO PCT/EP1997/001021 patent/WO1997032417A1/de active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0449716A1 (de) * | 1990-03-26 | 1991-10-02 | France Telecom | Einrichtung zur Kondensation von digitalen Daten |
Non-Patent Citations (4)
Title |
---|
ANONYMOUS: "Authentication Technique Using Manipulation Detection Codes", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 28, no. 4, September 1985 (1985-09-01), NEW YORK, US, pages 1426 - 1427, XP002033088 * |
CAMPANA M. ET AL.: "COMMENT UTILISER LES FONCTIONS DE CONDENSATION DANS LA PROTECTION DES DONNESS HOW TO USE COMPRESSED ENCODING MECHANISMS IN DATA PROTECTION", SECURICOM 88. WORLDWIDE CONGRESS ON COMPUTER AND COMMUNICATIONS SECURITY & PROTECTION, 1 January 1988 (1988-01-01), pages 91 - 110, XP000534196 * |
FRIEDRICHS B.: "ZUR FEHLERERKENNUNGSFÄHIGKEIT VON RANDOM CODES AM BEISPIEL DES MESSAGE AUTHENTICATION CODE", CODIERUNG FÜR QUELLE, KANAL UND ÜBERTRAGUNG, VORTRAGE DER ITG-FACHTAGUNG, MUNCHEN, OCT. 26 -28, 1994, no. NR. 130, 1 January 1994 (1994-01-01), INFORMATIONSTECHNISCHE GESELLSCHAFT IM VDE (ITG), pages 145 - 152, XP000503788 * |
MITCHELL C.J.: "AUTHENTICATING MULTICAST INTERNET ELECTRONIC MAIL MESSAGES USING A BIDIRECTIONAL MAC IS INSECURE", IEEE TRANSACTIONS ON COMPUTERS, vol. 41, no. 4, 1 April 1992 (1992-04-01), pages 505 - 507, XP000266865 * |
Also Published As
Publication number | Publication date |
---|---|
US6044488A (en) | 2000-03-28 |
DE19780129D2 (de) | 1998-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69031736T2 (de) | Verschlüsselungsmethode | |
EP2605445B1 (de) | Verfahren und Vorrichtung zur Absicherung von Blockchiffren gegen Template-Attacken | |
DE69330070T2 (de) | Verfahren und einrichtung zur erzeugung einer chiffriersequenz | |
DE69416809T2 (de) | Verbesserungen der Sicherheit in Datenverarbeitungssystemen | |
DE69728465T2 (de) | Nichtparalleler Mehrzyklus-Verschlüsselungsapparat | |
DE102005012098B4 (de) | Datenchiffrierprozessor sowie AES-Chiffriersystem und AES-Chiffrierverfahren | |
DE19827904C2 (de) | Blockchiffrier- oder -dechiffrierverfahren und Blockchiffrier- oder -dechiffriervorrichtung | |
DE69937007T2 (de) | Verfahren und vorrichtung zur verschlüsselung und entschlüsselung von daten | |
DE69807389T2 (de) | Verfahren und Einrichtung zur kryptographischen Verarbeitung und Speichermedium zur Speicherung eines kryptographischen Verarbeitungsprogramms zur Verbesserung der Sicherheit ohne beachtliche Vergrösserung der Hardware und der Verarbeitungzeit | |
EP0012974B1 (de) | Verfahren zur Chiffrierung von Datenblöcken einer vorgegebenen Länge | |
DE19744961A1 (de) | Erzeugen eindeutiger und unvorhersagbarer Werte | |
DE69911815T2 (de) | Selbstkorrigierendes zufallsverschlüsselungssystem und -verfahren | |
DE60315700T2 (de) | Verfahren zum erzeugen einer stromverschlüsselung mit mehreren schlüsseln | |
WO2016074774A1 (de) | Gehärtete white box implementierung | |
DE102009000869A1 (de) | Verfahren und Vorrichtung zur manipulationssicheren Übertragung von Daten | |
EP1298834B1 (de) | Verfahren und Vorrichtung zum Verschlüsseln und Entschlüsseln von Daten | |
EP3304802B1 (de) | Verfahren zur sicherstellung der informationssicherheit von über einen datenbus übertragenen daten sowie datenbussystem | |
DE60038042T2 (de) | Einserkomplement-verschlüsselungskombinator | |
DE69733424T2 (de) | Datendekorrelationsverfahren | |
WO1997032417A1 (de) | Verfahren zum generieren eines prüfworts für eine bitfolge zur überprüfung der integrität und authentizität der bitfolge | |
EP3369205B1 (de) | Alternative darstellung des krypto-algorithmus des | |
DE60133140T2 (de) | System und verfahren für symmetrische kryptographie | |
DE69006774T2 (de) | Verfahren zum Verschlüsseln einer Folge, die aus mindestens einem Symbol besteht. | |
DE60211008T2 (de) | Authentifizierung eines entfernten benutzers zu einem host in einem datenkommunikationssystem | |
EP2288073B1 (de) | Vorrichtung zur Verschlüsselung von Daten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): DE JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 08945592 Country of ref document: US |
|
REF | Corresponds to |
Ref document number: 19780129 Country of ref document: DE Date of ref document: 19980226 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 19780129 Country of ref document: DE |
|
NENP | Non-entry into the national phase |
Ref document number: 97530637 Country of ref document: JP |
|
122 | Ep: pct application non-entry in european phase |