On security of universal hash function based multiple authentication

3Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Universal hash function based multiple authentication was originally proposed by Wegman and Carter in 1981. In this authentication, a series of messages are authenticated by first hashing each message by a fixed (almost) strongly universal 2 hash function and then encrypting the hash value with a preshared one-time pad. This authentication is unconditionally secure. In this paper, we show that the unconditional security cannot be guaranteed if the hash function output for the first message is not encrypted, as remarked in [1]. This means that it is not only sufficient, but also necessary, to encrypt the hash of every message to be authenticated in order to have unconditional security. The security loss is demonstrated by a simple existential forgery attack. The impact of the attack is also discussed at the end. © 2012 Springer-Verlag.

References Powered by Scopus

Simple proof of security of the BB84 quantum key distribution protocol

2433Citations
N/AReaders
Get full text

Universal classes of hash functions

1669Citations
N/AReaders
Get full text

New hash functions and their use in authentication and set equality

1013Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Study on the security of the authentication scheme with key recycling in QKD

9Citations
N/AReaders
Get full text

DEVELOPMENT OF A MODIFIED UMAC ALGORITHM BASED ON CRYPTO-CODE CONSTRUCTIONS

4Citations
N/AReaders
Get full text

An Overview of Postprocessing in Quantum Key Distribution

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Abidin, A. (2012). On security of universal hash function based multiple authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7618 LNCS, pp. 303–310). https://doi.org/10.1007/978-3-642-34129-8_27

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 10

59%

Researcher 4

24%

Professor / Associate Prof. 2

12%

Lecturer / Post doc 1

6%

Readers' Discipline

Tooltip

Computer Science 18

95%

Physics and Astronomy 1

5%

Save time finding and organizing research with Mendeley

Sign up for free