{"title":"重新访问原语:分析近似消息身份验证码","authors":"S. Hossein, A. Tabatabaei, N. Zivic","doi":"10.1109/ICC.2014.6883408","DOIUrl":null,"url":null,"abstract":"In this paper, a well-known algorithm of approximate message authentication code (AMAC), its generalized scheme and its improved version are reconsidered. Weaknesses are discovered and some solutions for improving the security and performance of the algorithm are suggested. We introduce the number of runs of ones into the old approaches to reduce the noise tolerance combined with two other Boolean functions. Analysis for security, performance and comparison considerations are given along with the simulation results.","PeriodicalId":444628,"journal":{"name":"2014 IEEE International Conference on Communications (ICC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Revisiting a primitive: Analysis of approximate message authentication codes\",\"authors\":\"S. Hossein, A. Tabatabaei, N. Zivic\",\"doi\":\"10.1109/ICC.2014.6883408\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a well-known algorithm of approximate message authentication code (AMAC), its generalized scheme and its improved version are reconsidered. Weaknesses are discovered and some solutions for improving the security and performance of the algorithm are suggested. We introduce the number of runs of ones into the old approaches to reduce the noise tolerance combined with two other Boolean functions. Analysis for security, performance and comparison considerations are given along with the simulation results.\",\"PeriodicalId\":444628,\"journal\":{\"name\":\"2014 IEEE International Conference on Communications (ICC)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Communications (ICC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICC.2014.6883408\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Communications (ICC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC.2014.6883408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Revisiting a primitive: Analysis of approximate message authentication codes
In this paper, a well-known algorithm of approximate message authentication code (AMAC), its generalized scheme and its improved version are reconsidered. Weaknesses are discovered and some solutions for improving the security and performance of the algorithm are suggested. We introduce the number of runs of ones into the old approaches to reduce the noise tolerance combined with two other Boolean functions. Analysis for security, performance and comparison considerations are given along with the simulation results.