Message Authentication Codes with Error Correcting Capabilities View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2002-12-16

AUTHORS

Charles C. Y. Lam , Guang Gong , Scott A. Vanstone

ABSTRACT

In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new notion of error tolerant forgery of hash messages. These MACs allow full error recovery for all applications, while being error-tolerant for less information-sensitive applications. The classes of the keyed hash functions are highly secure, and provide the capabilities of correcting errors on transmission, including burst-errors, which is a typical phenomenon in wireless communications. These classes of hash functions are easily implementable in hardware by means of simple linear feedback shift register structures. More... »

PAGES

354-366

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30

DOI

http://dx.doi.org/10.1007/3-540-36159-6_30

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1020441167


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lam", 
        "givenName": "Charles C. Y.", 
        "id": "sg:person.012436040744.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012436040744.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gong", 
        "givenName": "Guang", 
        "id": "sg:person.014435421415.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435421415.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vanstone", 
        "givenName": "Scott A.", 
        "id": "sg:person.010344544767.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2002-12-16", 
    "datePublishedReg": "2002-12-16", 
    "description": "In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new notion of error tolerant forgery of hash messages. These MACs allow full error recovery for all applications, while being error-tolerant for less information-sensitive applications. The classes of the keyed hash functions are highly secure, and provide the capabilities of correcting errors on transmission, including burst-errors, which is a typical phenomenon in wireless communications. These classes of hash functions are easily implementable in hardware by means of simple linear feedback shift register structures.", 
    "editor": [
      {
        "familyName": "Deng", 
        "givenName": "Robert", 
        "type": "Person"
      }, 
      {
        "familyName": "Bao", 
        "givenName": "Feng", 
        "type": "Person"
      }, 
      {
        "familyName": "Zhou", 
        "givenName": "Jianying", 
        "type": "Person"
      }, 
      {
        "familyName": "Qing", 
        "givenName": "Sihan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-36159-6_30", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-00164-5", 
        "978-3-540-36159-6"
      ], 
      "name": "Information and Communications Security", 
      "type": "Book"
    }, 
    "keywords": [
      "message authentication code", 
      "authentication codes", 
      "hash function", 
      "keyed hash function", 
      "linear feedback shift register structure", 
      "error correcting capabilities", 
      "error recovery", 
      "wireless communication", 
      "new notion", 
      "code", 
      "register structure", 
      "capability", 
      "hardware", 
      "forgery", 
      "applications", 
      "messages", 
      "error", 
      "communication", 
      "class", 
      "transmission", 
      "notion", 
      "function", 
      "means", 
      "typical phenomenon", 
      "structure", 
      "phenomenon", 
      "recovery", 
      "paper"
    ], 
    "name": "Message Authentication Codes with Error Correcting Capabilities", 
    "pagination": "354-366", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1020441167"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-36159-6_30"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-36159-6_30", 
      "https://app.dimensions.ai/details/publication/pub.1020441167"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:51", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_324.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-36159-6_30"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'


 

This table displays all metadata directly associated to this object as RDF triples.

118 TRIPLES      22 PREDICATES      52 URIs      45 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-36159-6_30 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Na9f890df2a0f4219899405cf294081c8
4 schema:datePublished 2002-12-16
5 schema:datePublishedReg 2002-12-16
6 schema:description In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new notion of error tolerant forgery of hash messages. These MACs allow full error recovery for all applications, while being error-tolerant for less information-sensitive applications. The classes of the keyed hash functions are highly secure, and provide the capabilities of correcting errors on transmission, including burst-errors, which is a typical phenomenon in wireless communications. These classes of hash functions are easily implementable in hardware by means of simple linear feedback shift register structures.
7 schema:editor N0da460a010b24149a5f8adc14efe2109
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Nfbee4ed256d04ce297d7219f10fbb3d5
11 schema:keywords applications
12 authentication codes
13 capability
14 class
15 code
16 communication
17 error
18 error correcting capabilities
19 error recovery
20 forgery
21 function
22 hardware
23 hash function
24 keyed hash function
25 linear feedback shift register structure
26 means
27 message authentication code
28 messages
29 new notion
30 notion
31 paper
32 phenomenon
33 recovery
34 register structure
35 structure
36 transmission
37 typical phenomenon
38 wireless communication
39 schema:name Message Authentication Codes with Error Correcting Capabilities
40 schema:pagination 354-366
41 schema:productId Nbc0a343b48be4a74834ddca6b60319e3
42 Nf28b87f12c7645acb5d40d7229677ed8
43 schema:publisher N38c46486d0fc418aaaf1ae8149db8df8
44 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020441167
45 https://doi.org/10.1007/3-540-36159-6_30
46 schema:sdDatePublished 2022-12-01T06:51
47 schema:sdLicense https://scigraph.springernature.com/explorer/license/
48 schema:sdPublisher N6ab2e62e0fa14fdfba114ffcff774d15
49 schema:url https://doi.org/10.1007/3-540-36159-6_30
50 sgo:license sg:explorer/license/
51 sgo:sdDataset chapters
52 rdf:type schema:Chapter
53 N0da460a010b24149a5f8adc14efe2109 rdf:first Nbd506cabaeb348efaf4d09190119b3c3
54 rdf:rest Nbddd57dfeea5476d88c5b664a2647308
55 N38c46486d0fc418aaaf1ae8149db8df8 schema:name Springer Nature
56 rdf:type schema:Organisation
57 N4510e5b1845540569c7966c5e5d5c884 rdf:first sg:person.014435421415.03
58 rdf:rest Nf1817fa59670497f8221f8058b3163cc
59 N4e85433d6f0a4a8e9f642c4d8c0d6ac9 schema:familyName Zhou
60 schema:givenName Jianying
61 rdf:type schema:Person
62 N5f559d706277491ea5c5c1c5c050e4ae rdf:first N9d528306b0fa4821b90c15e795b97902
63 rdf:rest rdf:nil
64 N6ab2e62e0fa14fdfba114ffcff774d15 schema:name Springer Nature - SN SciGraph project
65 rdf:type schema:Organization
66 N9d528306b0fa4821b90c15e795b97902 schema:familyName Qing
67 schema:givenName Sihan
68 rdf:type schema:Person
69 Na9f890df2a0f4219899405cf294081c8 rdf:first sg:person.012436040744.03
70 rdf:rest N4510e5b1845540569c7966c5e5d5c884
71 Nac17dd3984eb4f768bca2e3151e3e4b1 rdf:first N4e85433d6f0a4a8e9f642c4d8c0d6ac9
72 rdf:rest N5f559d706277491ea5c5c1c5c050e4ae
73 Nbc0a343b48be4a74834ddca6b60319e3 schema:name doi
74 schema:value 10.1007/3-540-36159-6_30
75 rdf:type schema:PropertyValue
76 Nbd506cabaeb348efaf4d09190119b3c3 schema:familyName Deng
77 schema:givenName Robert
78 rdf:type schema:Person
79 Nbddd57dfeea5476d88c5b664a2647308 rdf:first Nfb38383d11514fa887b352591103c94c
80 rdf:rest Nac17dd3984eb4f768bca2e3151e3e4b1
81 Nf1817fa59670497f8221f8058b3163cc rdf:first sg:person.010344544767.07
82 rdf:rest rdf:nil
83 Nf28b87f12c7645acb5d40d7229677ed8 schema:name dimensions_id
84 schema:value pub.1020441167
85 rdf:type schema:PropertyValue
86 Nfb38383d11514fa887b352591103c94c schema:familyName Bao
87 schema:givenName Feng
88 rdf:type schema:Person
89 Nfbee4ed256d04ce297d7219f10fbb3d5 schema:isbn 978-3-540-00164-5
90 978-3-540-36159-6
91 schema:name Information and Communications Security
92 rdf:type schema:Book
93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
94 schema:name Information and Computing Sciences
95 rdf:type schema:DefinedTerm
96 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
97 schema:name Data Format
98 rdf:type schema:DefinedTerm
99 sg:person.010344544767.07 schema:affiliation grid-institutes:grid.46078.3d
100 schema:familyName Vanstone
101 schema:givenName Scott A.
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07
103 rdf:type schema:Person
104 sg:person.012436040744.03 schema:affiliation grid-institutes:grid.46078.3d
105 schema:familyName Lam
106 schema:givenName Charles C. Y.
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012436040744.03
108 rdf:type schema:Person
109 sg:person.014435421415.03 schema:affiliation grid-institutes:grid.46078.3d
110 schema:familyName Gong
111 schema:givenName Guang
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435421415.03
113 rdf:type schema:Person
114 grid-institutes:grid.46078.3d schema:alternateName Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
115 Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
116 schema:name Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
117 Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
118 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...