skip to main content
10.1145/2093698.2093764acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisabelConference Proceedingsconference-collections
research-article

Trust in corrected messages protected by message authentication codes

Published: 26 October 2011 Publication History

Abstract

An algorithm for correction and soft verification of message protected by cryptographic check values like MAC is presented. The algorithm uses soft output values of the channel decoder which are given as input of the cryptographic verification module. The criterion of standard verification becomes less strict, when the algorithm for correction and soft verification is introduced. Soft verification allows the correction of messages, if only some bits of the message and the MAC are modified. So, many disturbed messages, which cannot be corrected by repetition, can be recovered -- at the cost of trust in the message. This paper introduces the quantified unit of trust in a message and presents the results of simulations, showing a significant improvement of the acceptance rate of the cryptographic verification.

References

[1]
Zivic, N., Joint Channel Coding and Cryptography, Shaker Verlag, Aachen (2008).
[2]
Ruland, C., Živić N., Soft Input Decryption, 4th Turbocode Conference, 6th Source and Channel Code Conference, VDE/IEEE (Munich, Germany, April 2006).
[3]
Chase, D., A Class of Algorithms for Decoding Block Codes with Channel Measurement Information, IEEE Trans. Inform. Theory, IT- 18, pp. 170--182 (January 1972).
[4]
Forney, G. D. Jr., Generalized Minimum Distance Decoding, IEEE Trans. Inform. Theory, IT-12, pp. 125--131 (April 1966).
[5]
Lin, S., Costello, D. J., Error Control Coding, Pearson Prentice Hall (USA, 2004).
[6]
Information technology -- Security techniques -- Part 2: Digital signatures, ISO/IEC 15946-2 (2002).
[7]
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher, ISO/IEC 9797-1 (1999).
[8]
Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a hash- function, ISO/IEC 9797-2 (2000).
[9]
Hays, H. M., Tavares, S. E., Avalanche characteristics of Substitution -- Permutation Encryption Networks, IEEE Trans. On Computers, Vol. 44, Nr. 9 (September 1995).

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISABEL '11: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
October 2011
949 pages
ISBN:9781450309134
DOI:10.1145/2093698
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Universitat Pompeu Fabra
  • IEEE
  • Technical University of Catalonia Spain: Technical University of Catalonia (UPC), Spain
  • River Publishers: River Publishers
  • CTTC: Technological Center for Telecommunications of Catalonia
  • CTIF: Kyranova Ltd, Center for TeleInFrastruktur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. algorithm for correction and soft verification
  2. hard verification
  3. message authentication codes
  4. reliability values
  5. soft verification
  6. trust

Qualifiers

  • Research-article

Conference

ISABEL '11
Sponsor:
  • Technical University of Catalonia Spain
  • River Publishers
  • CTTC
  • CTIF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 49
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media