基于Hybrid-MD算法的增强MAC

Muslim Muslim, Suarga Suarga, As’ad Djamalilleil, Fitriyani Umar, Mardiyyah Hasnawi, Syahrul Mubarak
{"title":"基于Hybrid-MD算法的增强MAC","authors":"Muslim Muslim, Suarga Suarga, As’ad Djamalilleil, Fitriyani Umar, Mardiyyah Hasnawi, Syahrul Mubarak","doi":"10.1109/EIConCIT.2018.8878523","DOIUrl":null,"url":null,"abstract":"In the digital era like now almost all transactions are done in online. However, information on the results of transactions sent through digital communication channels are very vulnerable to counterfeiting attacks. Therefore, it is made to ensure that the received message information is still intact and genuine. A MAC is a cryptographic algorithm that is suitable and widely used as a solution for such problems even though there are still many tricks that can be used by attackers to find fake messages for deceive other parties. The secure Ok-MAC algorithm developed in this paper is that enhanced MAC uses a message digest based on a hybrid of two existing message digests using just one key. The test results show that for the small-sized message the MAC algorithm Ok-MAC is slightly slower (26.53 ms) than the HMAC-SHA-1 (24.94 ms) and Ok-MAC is expected to validate the integrity and authenticity of the sort message well.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhanced MAC based on Hybrid-MD Algorithm\",\"authors\":\"Muslim Muslim, Suarga Suarga, As’ad Djamalilleil, Fitriyani Umar, Mardiyyah Hasnawi, Syahrul Mubarak\",\"doi\":\"10.1109/EIConCIT.2018.8878523\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the digital era like now almost all transactions are done in online. However, information on the results of transactions sent through digital communication channels are very vulnerable to counterfeiting attacks. Therefore, it is made to ensure that the received message information is still intact and genuine. A MAC is a cryptographic algorithm that is suitable and widely used as a solution for such problems even though there are still many tricks that can be used by attackers to find fake messages for deceive other parties. The secure Ok-MAC algorithm developed in this paper is that enhanced MAC uses a message digest based on a hybrid of two existing message digests using just one key. The test results show that for the small-sized message the MAC algorithm Ok-MAC is slightly slower (26.53 ms) than the HMAC-SHA-1 (24.94 ms) and Ok-MAC is expected to validate the integrity and authenticity of the sort message well.\",\"PeriodicalId\":424909,\"journal\":{\"name\":\"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIConCIT.2018.8878523\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIConCIT.2018.8878523","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在现在这样的数字时代,几乎所有的交易都是在网上完成的。然而,通过数字通信渠道发送的有关交易结果的信息非常容易受到假冒攻击。因此,这样做是为了确保接收到的消息信息仍然是完整和真实的。MAC是一种适合并广泛用于解决此类问题的加密算法,尽管攻击者仍然可以使用许多技巧来找到虚假消息以欺骗其他方。本文开发的安全的Ok-MAC算法是增强型MAC使用基于两个现有消息摘要的混合消息摘要,仅使用一个密钥。测试结果表明,对于小尺寸的消息,MAC算法Ok-MAC (26.53 ms)比HMAC-SHA-1 (24.94 ms)略慢,并且Ok-MAC有望很好地验证排序消息的完整性和真实性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Enhanced MAC based on Hybrid-MD Algorithm
In the digital era like now almost all transactions are done in online. However, information on the results of transactions sent through digital communication channels are very vulnerable to counterfeiting attacks. Therefore, it is made to ensure that the received message information is still intact and genuine. A MAC is a cryptographic algorithm that is suitable and widely used as a solution for such problems even though there are still many tricks that can be used by attackers to find fake messages for deceive other parties. The secure Ok-MAC algorithm developed in this paper is that enhanced MAC uses a message digest based on a hybrid of two existing message digests using just one key. The test results show that for the small-sized message the MAC algorithm Ok-MAC is slightly slower (26.53 ms) than the HMAC-SHA-1 (24.94 ms) and Ok-MAC is expected to validate the integrity and authenticity of the sort message well.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信