Abstract
We present a Message Authentication Code (MAC) with integrated error correction capability, called AEC. The MAC itself can detect/correct errors upto a certain limit and provides an estimate of the number and location of the errors. The security of AEC lies in the random selection of the underlying error correcting code (ECC). In this work, we propose a new on-the-fly solution to this problem of random ECC selection, making it highly secure. Moreover, this solution combined with the simple and regular structure of Cellular Automata (CA) based ECC, makes it highly suitable for efficient hardware implementation. Detailed FPGA implementations of both standalone and compact variants of AEC, are presented on the Spartan-3 FPGA platform. The compact implementation has low area footprint and high throughput making it particularly suitable for resource constrained applications. To the best of our knowledge this is the only practical design of an ECC-MAC scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129–139. Springer, Heidelberg (1994)
Boncelet Jr., C.G.: The ntmac for authentication of noisy messages. IEEE Transactions on Information Forensics and Security 1(1), 35–42 (2006)
Liu, Y., Boncelet, C.G.: The crc–ntmac for noisy message authentication. IEEE Transactions on Information Forensics and Security 1(4), 517–523 (2006)
Liu, Y., Boncelet, C.G.: The bch-ntmac for noisy message authentication. In: 2006 40th Annual Conference on Information Sciences and Systems, pp. 246–251 (March 2006)
Bhaumik, J., Roy Chowdhury, D.: An integrated ecc-mac based on rs code. Transactions on Computational Science 4, 117–135 (2009)
Alex Halderman, J., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Cal, J.A., Feldman, A.J., Felten, E.W.: Least we remember: Cold boot attacks on encryption keys. In: USENIX Security Symposium (2008)
Rabin, M.O.: Probabilistic algorithms in finite fields. SIAM J. Comput. 9, 273–280 (1979)
Cattell, K., Muzio, J.C.: Synthesis of one-dimensional linear hybrid cellular automata. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 15(3), 325–335 (1996)
Chaudhuri, P.P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications. IEEE Computer Society Press (1997)
Golomb, S.W.: Shift register sequences (1967)
Comer, J.M., Cerda, J.C., Martinez, C.D., Hoe, D.H.K.: Random number generators using cellular automata implemented on fpgas. In: 2012 44th Southeastern Symposium on System Theory (SSST), pp. 67–72 (March 2012)
Wolfram, S.: Random sequence generation by cellular automata. Advances in Applied Mathematics 7(2), 123–169 (1986)
Mignotte, M.: Mathematics for Computer Algebra. Springer (1992)
Bhaumik, J., Roy Chowdhury, D.: Nmix: An ideal candidate for key mixing. In: SECRYPT, pp. 285–288 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Sengupta, A., Saha, D., Ghosh, S., Mehta, D., Chowdhury, D.R. (2014). AEC: A Practical Scheme for Authentication with Error Correction. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2014. Lecture Notes in Computer Science, vol 8804. Springer, Cham. https://doi.org/10.1007/978-3-319-12060-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-12060-7_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12059-1
Online ISBN: 978-3-319-12060-7
eBook Packages: Computer ScienceComputer Science (R0)