Keying Hash Functions for Message Authentication View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1996

AUTHORS

Mihir Bellare , Ran Canetti , Hugo Krawczyk

ABSTRACT

The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis.We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported. More... »

PAGES

1-15

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1

DOI

http://dx.doi.org/10.1007/3-540-68697-5_1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1024453790


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA", 
          "id": "http://www.grid.ac/institutes/grid.266100.3", 
          "name": [
            "Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bellare", 
        "givenName": "Mihir", 
        "id": "sg:person.011052537334.13", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011052537334.13"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA", 
          "id": "http://www.grid.ac/institutes/grid.116068.8", 
          "name": [
            "MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Canetti", 
        "givenName": "Ran", 
        "id": "sg:person.012320111457.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012320111457.74"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA", 
          "id": "http://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Krawczyk", 
        "givenName": "Hugo", 
        "id": "sg:person.013004021661.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1996", 
    "datePublishedReg": "1996-01-01", 
    "description": "The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis.We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported.", 
    "editor": [
      {
        "familyName": "Koblitz", 
        "givenName": "Neal", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-68697-5_1", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-61512-5", 
        "978-3-540-68697-2"
      ], 
      "name": "Advances in Cryptology \u2014 CRYPTO \u201996", 
      "type": "Book"
    }, 
    "keywords": [
      "cryptographic hash functions", 
      "hash function", 
      "message authentication", 
      "Internet Security Protocols", 
      "sound security analysis", 
      "message authentication scheme", 
      "authentication scheme", 
      "security protocols", 
      "security analysis", 
      "library code", 
      "cryptographic strength", 
      "SHA-1", 
      "authentication", 
      "black box", 
      "scheme", 
      "practical construction", 
      "HMAC", 
      "MD5", 
      "hardware", 
      "standard approach", 
      "security", 
      "NMAC", 
      "simple way", 
      "code", 
      "quantitative way", 
      "way", 
      "protocol", 
      "applications", 
      "replaceability", 
      "performance", 
      "box", 
      "construction", 
      "function", 
      "use", 
      "analysis", 
      "mechanism", 
      "strength", 
      "approach"
    ], 
    "name": "Keying Hash Functions for Message Authentication", 
    "pagination": "1-15", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1024453790"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-68697-5_1"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-68697-5_1", 
      "https://app.dimensions.ai/details/publication/pub.1024453790"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_135.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-68697-5_1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'


 

This table displays all metadata directly associated to this object as RDF triples.

117 TRIPLES      22 PREDICATES      63 URIs      56 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-68697-5_1 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N0a651e743288451eaa32c37b76daa3e3
4 schema:datePublished 1996
5 schema:datePublishedReg 1996-01-01
6 schema:description The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis.We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported.
7 schema:editor N64aa0566faa24b92af004c6db1274510
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N0bc50b4dbaf740f29b01acc7b394080a
11 schema:keywords HMAC
12 Internet Security Protocols
13 MD5
14 NMAC
15 SHA-1
16 analysis
17 applications
18 approach
19 authentication
20 authentication scheme
21 black box
22 box
23 code
24 construction
25 cryptographic hash functions
26 cryptographic strength
27 function
28 hardware
29 hash function
30 library code
31 mechanism
32 message authentication
33 message authentication scheme
34 performance
35 practical construction
36 protocol
37 quantitative way
38 replaceability
39 scheme
40 security
41 security analysis
42 security protocols
43 simple way
44 sound security analysis
45 standard approach
46 strength
47 use
48 way
49 schema:name Keying Hash Functions for Message Authentication
50 schema:pagination 1-15
51 schema:productId N00bc2cecc0864a108a79f0b72608281c
52 N73b9db69fabd4add88960905101bf593
53 schema:publisher N8c9213b8689349a8a08e44fa405efdbc
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024453790
55 https://doi.org/10.1007/3-540-68697-5_1
56 schema:sdDatePublished 2022-12-01T06:47
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher Na799de02a1d944f3960972982503de16
59 schema:url https://doi.org/10.1007/3-540-68697-5_1
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N00bc2cecc0864a108a79f0b72608281c schema:name dimensions_id
64 schema:value pub.1024453790
65 rdf:type schema:PropertyValue
66 N0a651e743288451eaa32c37b76daa3e3 rdf:first sg:person.011052537334.13
67 rdf:rest Na163db0ccfc442ba91f280c8d2855313
68 N0bc50b4dbaf740f29b01acc7b394080a schema:isbn 978-3-540-61512-5
69 978-3-540-68697-2
70 schema:name Advances in Cryptology — CRYPTO ’96
71 rdf:type schema:Book
72 N64aa0566faa24b92af004c6db1274510 rdf:first N70bdd64decb34b9abc701231d0f5954b
73 rdf:rest rdf:nil
74 N70bdd64decb34b9abc701231d0f5954b schema:familyName Koblitz
75 schema:givenName Neal
76 rdf:type schema:Person
77 N73b9db69fabd4add88960905101bf593 schema:name doi
78 schema:value 10.1007/3-540-68697-5_1
79 rdf:type schema:PropertyValue
80 N8c9213b8689349a8a08e44fa405efdbc schema:name Springer Nature
81 rdf:type schema:Organisation
82 Na163db0ccfc442ba91f280c8d2855313 rdf:first sg:person.012320111457.74
83 rdf:rest Ndd5a4345a4324e71a7f36a4ca9fb0745
84 Na799de02a1d944f3960972982503de16 schema:name Springer Nature - SN SciGraph project
85 rdf:type schema:Organization
86 Ndd5a4345a4324e71a7f36a4ca9fb0745 rdf:first sg:person.013004021661.30
87 rdf:rest rdf:nil
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.011052537334.13 schema:affiliation grid-institutes:grid.266100.3
95 schema:familyName Bellare
96 schema:givenName Mihir
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011052537334.13
98 rdf:type schema:Person
99 sg:person.012320111457.74 schema:affiliation grid-institutes:grid.116068.8
100 schema:familyName Canetti
101 schema:givenName Ran
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012320111457.74
103 rdf:type schema:Person
104 sg:person.013004021661.30 schema:affiliation grid-institutes:grid.481554.9
105 schema:familyName Krawczyk
106 schema:givenName Hugo
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30
108 rdf:type schema:Person
109 grid-institutes:grid.116068.8 schema:alternateName MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA
110 schema:name MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA
111 rdf:type schema:Organization
112 grid-institutes:grid.266100.3 schema:alternateName Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA
113 schema:name Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA
114 rdf:type schema:Organization
115 grid-institutes:grid.481554.9 schema:alternateName IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA
116 schema:name IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA
117 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...