Abstract
A method of calculating an integrity check value (icv) with the use of a stream cipher is presented. The strength of the message integrity this provides is analysed and proven to be dependent on the unpredictability of the stream cipher used. A way of efficiently providing both integrity and encryption with the use of a single stream cipher is also explained. Note that the method of providing message integrity, used with or without encryption, is not subject to a number of attacks that succeed against many conventional integrity schemes. Specifically any legitimate message-icv pair that is copied or removed and subsequently replayed will have an appropriately small small chance of deceiving the receiver. Furthermore, any message-icv pair generated by an attacker and injected into the communication channel will have an appropriately small chance of escaping detection unless the attacker has actually broken the stream cipher. This is the case even if the attacker has any amount of chosen messages and corresponding icvs or performs any number of calculations.
Chapter PDF
Similar content being viewed by others
References
Brassard, G.: On Computationally Secure Authentication Tags. Advances in Cryptology-CRYPTO’82, proceedings, Springer-Verlag (1983) 79–86
Carter, J. L., Wegman, M. N.: Universal Classes of Hash Functions. Journal of Computer and Systems Sciences 18 (1979) 143–154
Damgaard, I. B.: A Design Principle for Hash Functions. Advances in Cryptology-CRYPTO’89, proceedings, Springer-Verlag (1990) 416–427
ISO/IEC 9797: Data Cryptographic Techniques-Data Integrity Mechanism using a Cryptographic Check Function employing a Block Cipher Algorithm. International Organisation for Standardisation (1989)
Jueneman, R. R.: A High-Speed Manipulation Detection Code. Advances in Cryptology-CRYPTO’86, proceedings, Springer-Verlag (1987) 327–346
Knobloch, H. J.: A Smart Card Implementation of the Fiat-Shamir Identification Scheme. Advances in Cryptology-EUROCRYPT’88, proceedings, Springer-Verlag (1989) 87–96
Knuth, D.: The Art of Computer Programming. Vol. 2, 2nd edition, Addison-Wesley, Reading, Mass. (1981)
Lai, X., Massey, J. L.: Hash Functions based on Block Ciphers. EUROCRYPT’92, extended abstracts (1992) 53–67
Lai, X., Rueppel, R. A., Woollven, J.: A Fast Cryptographic Checksum Algorithm based on Stream Ciphers. AUSCRYPT’92, abstracts (1992) 8-7–8-11
Merkle, R. C: One Way Hash Functions and DES. Advances in Cryptology-CRYPTO’89, proceedings, Springer-Verlag (1990) 428–446
Niven, I., Zuckerman, H. S.: The Theory of Numbers (fourth edition). John Wiley and Sons, New York-Chichester-Brisbane-Toronto (1980)
Rivest, R. L.: The MD4 Message Digest Algorithm. Advances in Cryptology-CRYPTO’90, proceedings, Springer-Verlag (1991) 303–311
Rueppel, R. A.: Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin (1986)
Wegman, M. N., Carter, J. L.: New Hash Functions and their use in Authentication and Set Equality. Journal of Computer and System Sciences 22 (1981) 265–279
Yuval, G.: How to Swindle Rabin. Cryptologia 3 (1979) 187–189
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Taylor, R. (1994). An Integrity Check Value Algorithm for Stream Ciphers. In: Stinson, D.R. (eds) Advances in Cryptology — CRYPTO’ 93. CRYPTO 1993. Lecture Notes in Computer Science, vol 773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48329-2_4
Download citation
DOI: https://doi.org/10.1007/3-540-48329-2_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57766-9
Online ISBN: 978-3-540-48329-8
eBook Packages: Springer Book Archive