{"title":"Revisiting a primitive: Analysis of approximate message authentication codes","authors":"S. Hossein, A. Tabatabaei, N. Zivic","doi":"10.1109/ICC.2014.6883408","DOIUrl":null,"url":null,"abstract":"In this paper, a well-known algorithm of approximate message authentication code (AMAC), its generalized scheme and its improved version are reconsidered. Weaknesses are discovered and some solutions for improving the security and performance of the algorithm are suggested. We introduce the number of runs of ones into the old approaches to reduce the noise tolerance combined with two other Boolean functions. Analysis for security, performance and comparison considerations are given along with the simulation results.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Communications (ICC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.2014.6883408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, a well-known algorithm of approximate message authentication code (AMAC), its generalized scheme and its improved version are reconsidered. Weaknesses are discovered and some solutions for improving the security and performance of the algorithm are suggested. We introduce the number of runs of ones into the old approaches to reduce the noise tolerance combined with two other Boolean functions. Analysis for security, performance and comparison considerations are given along with the simulation results.