Skip to main content

AEC: A Practical Scheme for Authentication with Error Correction

  • Conference paper
Security, Privacy, and Applied Cryptography Engineering (SPACE 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8804))

  • 1802 Accesses

Abstract

We present a Message Authentication Code (MAC) with integrated error correction capability, called AEC. The MAC itself can detect/correct errors upto a certain limit and provides an estimate of the number and location of the errors. The security of AEC lies in the random selection of the underlying error correcting code (ECC). In this work, we propose a new on-the-fly solution to this problem of random ECC selection, making it highly secure. Moreover, this solution combined with the simple and regular structure of Cellular Automata (CA) based ECC, makes it highly suitable for efficient hardware implementation. Detailed FPGA implementations of both standalone and compact variants of AEC, are presented on the Spartan-3 FPGA platform. The compact implementation has low area footprint and high throughput making it particularly suitable for resource constrained applications. To the best of our knowledge this is the only practical design of an ECC-MAC scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129–139. Springer, Heidelberg (1994)

    Google Scholar 

  2. Boncelet Jr., C.G.: The ntmac for authentication of noisy messages. IEEE Transactions on Information Forensics and Security 1(1), 35–42 (2006)

    Article  Google Scholar 

  3. Liu, Y., Boncelet, C.G.: The crc–ntmac for noisy message authentication. IEEE Transactions on Information Forensics and Security 1(4), 517–523 (2006)

    Article  Google Scholar 

  4. Liu, Y., Boncelet, C.G.: The bch-ntmac for noisy message authentication. In: 2006 40th Annual Conference on Information Sciences and Systems, pp. 246–251 (March 2006)

    Google Scholar 

  5. Bhaumik, J., Roy Chowdhury, D.: An integrated ecc-mac based on rs code. Transactions on Computational Science 4, 117–135 (2009)

    Google Scholar 

  6. Alex Halderman, J., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Cal, J.A., Feldman, A.J., Felten, E.W.: Least we remember: Cold boot attacks on encryption keys. In: USENIX Security Symposium (2008)

    Google Scholar 

  7. Rabin, M.O.: Probabilistic algorithms in finite fields. SIAM J. Comput. 9, 273–280 (1979)

    Article  MathSciNet  Google Scholar 

  8. Cattell, K., Muzio, J.C.: Synthesis of one-dimensional linear hybrid cellular automata. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 15(3), 325–335 (1996)

    Article  Google Scholar 

  9. Chaudhuri, P.P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications. IEEE Computer Society Press (1997)

    Google Scholar 

  10. Golomb, S.W.: Shift register sequences (1967)

    Google Scholar 

  11. Comer, J.M., Cerda, J.C., Martinez, C.D., Hoe, D.H.K.: Random number generators using cellular automata implemented on fpgas. In: 2012 44th Southeastern Symposium on System Theory (SSST), pp. 67–72 (March 2012)

    Google Scholar 

  12. Wolfram, S.: Random sequence generation by cellular automata. Advances in Applied Mathematics 7(2), 123–169 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  13. Mignotte, M.: Mathematics for Computer Algebra. Springer (1992)

    Google Scholar 

  14. Bhaumik, J., Roy Chowdhury, D.: Nmix: An ideal candidate for key mixing. In: SECRYPT, pp. 285–288 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Sengupta, A., Saha, D., Ghosh, S., Mehta, D., Chowdhury, D.R. (2014). AEC: A Practical Scheme for Authentication with Error Correction. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2014. Lecture Notes in Computer Science, vol 8804. Springer, Cham. https://doi.org/10.1007/978-3-319-12060-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12060-7_11

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12059-1

  • Online ISBN: 978-3-319-12060-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics