BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME

Author:

TONIEN DONGVU1,SAFAVI-NAINI REIHANEH2,NICKOLAS PETER3

Affiliation:

1. Mathematical Sciences Institute, Australian National University, Canberra, Australia

2. Department of Computer Science, University of Calgary, Calgary, AB, Canada

3. Faculty of Informatics, University of Wollongong, Wollongong, NSW, Australia

Abstract

Traditional hash functions are designed to protect against even the slightest modification of a message. Thus, one bit changed in a message would result in a totally different message digest when a hash function is applied. This feature is not suitable for applications whose message spaces admit a certain fuzziness, such as multimedia communications or biometric authentication applications. In these applications, approximate hash functions must be designed so that the distance between messages are proportionally reflected in the distance between message digests. Most of the previous designs of approximate hash functions employ traditional hash functions. In an ingenious approximate message authentication scheme for an N-ary alphabet recently proposed by Ge, Arce and Crescenzo, the approximate hash functions are based on the majority selection function. This scheme is suitable for N-ary messages with arbitrary alphabet size N. In this paper, we show a hidden property of the majority selection function, which allows us to successfully break this scheme. We show that an adversary, by observing just one message and digest pair, without any knowledge of the secret information, can generate N - 1 new valid message and digest pairs. In order to resist the attack, we propose some modifications to the original design. The corrected scheme is as efficient as the original scheme and it is secure against the attack. By a new combinatorial approach, we calculate explicitly the security parameters of the corrected scheme.

Publisher

World Scientific Pub Co Pte Lt

Subject

Discrete Mathematics and Combinatorics

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Mechanismen für störungstolerante Datenauthentifizierung;Störungstolerante Datenauthentifizierung für drahtlose Kommunikation;2024

2. Efficient approximate message authentication scheme;IET Information Security;2018-01

3. Noise Tolerant Data Authentication Mechanisms;Signals and Communication Technology;2018

4. Discrete Wavelet Transform based Watermarking for Image Content Authentication;Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods;2017

5. Secure and Robust Two-Phase Image Authentication;IEEE Transactions on Multimedia;2015-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3