Keying Hash Functions for Message Authentication View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1996

AUTHORS

Mihir Bellare , Ran Canetti , Hugo Krawczyk

ABSTRACT

The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis.We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported. More... »

PAGES

1-15

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1

DOI

http://dx.doi.org/10.1007/3-540-68697-5_1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1024453790


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA", 
          "id": "http://www.grid.ac/institutes/grid.266100.3", 
          "name": [
            "Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bellare", 
        "givenName": "Mihir", 
        "id": "sg:person.011052537334.13", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011052537334.13"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA", 
          "id": "http://www.grid.ac/institutes/grid.116068.8", 
          "name": [
            "MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Canetti", 
        "givenName": "Ran", 
        "id": "sg:person.012320111457.74", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012320111457.74"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA", 
          "id": "http://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Krawczyk", 
        "givenName": "Hugo", 
        "id": "sg:person.013004021661.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1996", 
    "datePublishedReg": "1996-01-01", 
    "description": "The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis.We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported.", 
    "editor": [
      {
        "familyName": "Koblitz", 
        "givenName": "Neal", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-68697-5_1", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-61512-5", 
        "978-3-540-68697-2"
      ], 
      "name": "Advances in Cryptology \u2014 CRYPTO \u201996", 
      "type": "Book"
    }, 
    "keywords": [
      "cryptographic hash functions", 
      "hash function", 
      "message authentication", 
      "Internet Security Protocols", 
      "sound security analysis", 
      "message authentication scheme", 
      "authentication scheme", 
      "security protocols", 
      "security analysis", 
      "library code", 
      "cryptographic strength", 
      "SHA-1", 
      "authentication", 
      "black box", 
      "scheme", 
      "practical construction", 
      "HMAC", 
      "MD5", 
      "hardware", 
      "standard approach", 
      "security", 
      "NMAC", 
      "simple way", 
      "code", 
      "quantitative way", 
      "way", 
      "protocol", 
      "applications", 
      "replaceability", 
      "performance", 
      "box", 
      "construction", 
      "function", 
      "use", 
      "analysis", 
      "mechanism", 
      "strength", 
      "approach"
    ], 
    "name": "Keying Hash Functions for Message Authentication", 
    "pagination": "1-15", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1024453790"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-68697-5_1"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-68697-5_1", 
      "https://app.dimensions.ai/details/publication/pub.1024453790"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_135.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-68697-5_1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-68697-5_1'


 

This table displays all metadata directly associated to this object as RDF triples.

117 TRIPLES      22 PREDICATES      63 URIs      56 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-68697-5_1 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N4cd36f655f1045b5847b081697626a67
4 schema:datePublished 1996
5 schema:datePublishedReg 1996-01-01
6 schema:description The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis.We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported.
7 schema:editor N62f576bbbcaa4e70a98e843f15cf7584
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Ndad40f95ff964a9f848a1b6237bafd7c
11 schema:keywords HMAC
12 Internet Security Protocols
13 MD5
14 NMAC
15 SHA-1
16 analysis
17 applications
18 approach
19 authentication
20 authentication scheme
21 black box
22 box
23 code
24 construction
25 cryptographic hash functions
26 cryptographic strength
27 function
28 hardware
29 hash function
30 library code
31 mechanism
32 message authentication
33 message authentication scheme
34 performance
35 practical construction
36 protocol
37 quantitative way
38 replaceability
39 scheme
40 security
41 security analysis
42 security protocols
43 simple way
44 sound security analysis
45 standard approach
46 strength
47 use
48 way
49 schema:name Keying Hash Functions for Message Authentication
50 schema:pagination 1-15
51 schema:productId N0cb72fb68d514f88b3733427628dfeec
52 Nf3452a8d67e94c0b898073510a987b0e
53 schema:publisher Nac1b8b5286a64004b21e67283e86f6e5
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024453790
55 https://doi.org/10.1007/3-540-68697-5_1
56 schema:sdDatePublished 2022-12-01T06:47
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N157523bfd954486ebb3c3c08f6316ca0
59 schema:url https://doi.org/10.1007/3-540-68697-5_1
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N0cb72fb68d514f88b3733427628dfeec schema:name dimensions_id
64 schema:value pub.1024453790
65 rdf:type schema:PropertyValue
66 N157523bfd954486ebb3c3c08f6316ca0 schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 N4cd36f655f1045b5847b081697626a67 rdf:first sg:person.011052537334.13
69 rdf:rest Nc9d7e4c8537a4cfe9c3237c240a3a904
70 N62f576bbbcaa4e70a98e843f15cf7584 rdf:first N89646a9604e744c594ebfa29e68a3ab5
71 rdf:rest rdf:nil
72 N89646a9604e744c594ebfa29e68a3ab5 schema:familyName Koblitz
73 schema:givenName Neal
74 rdf:type schema:Person
75 Nac1b8b5286a64004b21e67283e86f6e5 schema:name Springer Nature
76 rdf:type schema:Organisation
77 Nc9d7e4c8537a4cfe9c3237c240a3a904 rdf:first sg:person.012320111457.74
78 rdf:rest Ne2445999d8a5424fad35276104402150
79 Ndad40f95ff964a9f848a1b6237bafd7c schema:isbn 978-3-540-61512-5
80 978-3-540-68697-2
81 schema:name Advances in Cryptology — CRYPTO ’96
82 rdf:type schema:Book
83 Ne2445999d8a5424fad35276104402150 rdf:first sg:person.013004021661.30
84 rdf:rest rdf:nil
85 Nf3452a8d67e94c0b898073510a987b0e schema:name doi
86 schema:value 10.1007/3-540-68697-5_1
87 rdf:type schema:PropertyValue
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.011052537334.13 schema:affiliation grid-institutes:grid.266100.3
95 schema:familyName Bellare
96 schema:givenName Mihir
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011052537334.13
98 rdf:type schema:Person
99 sg:person.012320111457.74 schema:affiliation grid-institutes:grid.116068.8
100 schema:familyName Canetti
101 schema:givenName Ran
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012320111457.74
103 rdf:type schema:Person
104 sg:person.013004021661.30 schema:affiliation grid-institutes:grid.481554.9
105 schema:familyName Krawczyk
106 schema:givenName Hugo
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30
108 rdf:type schema:Person
109 grid-institutes:grid.116068.8 schema:alternateName MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA
110 schema:name MIT Laboratory for Computer Science, 545 Technology Square, 02139, Cambridge, MA, USA
111 rdf:type schema:Organization
112 grid-institutes:grid.266100.3 schema:alternateName Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA
113 schema:name Department of Computer Science and Engineering, Mail Code 0114, University of California at San Diego, 9500 Gilman Drive, 92093, La Jolla, CA, USA
114 rdf:type schema:Organization
115 grid-institutes:grid.481554.9 schema:alternateName IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA
116 schema:name IBM T.J. Watson Research Center, PO Box 704, 10598, Yorktown Heights, NY, USA
117 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...