메뉴 건너뛰기




Volumn , Issue , 2009, Pages 419-424

On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques

Author keywords

Data integrity; Data origin authentication; Message authentication code; Skipjack; Wireless sensor networks

Indexed keywords

BLOCK CHAINING; BLOCK CIPHERS; CIPHER-BLOCK-CHAINING; CLOCK CYCLES; DATA INTEGRITY; DATA ORIGIN AUTHENTICATION; DE FACTO; ENERGY REQUIREMENTS; MESSAGE AUTHENTICATION CODE; MESSAGE AUTHENTICATION CODES; SECURITY PROTOCOLS; SENSOR APPLICATIONS; SOFTWARE SIMULATION; TINYSEC;

EID: 74049117578     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NGMAST.2009.78     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 1
    • 33748021549 scopus 로고
    • File verification using CRC
    • May
    • Nelson M., "File verification using CRC", Dr Dobbs Journal, May 1992, pp.64-67.
    • (1992) Dr Dobbs Journal , pp. 64-67
    • Nelson, M.1
  • 2
    • 0343387037 scopus 로고
    • Data cryptographic techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm,
    • ISO/IEC 9797
    • ISO/IEC 9797, Data cryptographic techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, 1989.
    • (1989)
  • 3
    • 74049100296 scopus 로고    scopus 로고
    • Federal Information Processing Standard (FIPS) Publication 186-2 Digital Signature Standard (DSS). US/DoC NIST. January 27, 2000. October 5, 2001 a change notice was appended.
    • Federal Information Processing Standard (FIPS) Publication 186-2 Digital Signature Standard (DSS). US/DoC NIST. January 27, 2000. October 5, 2001 a change notice was appended.
  • 4
    • 0347124644 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, version 2, 29 May
    • National Institute of Standards and Technology, "SKIPJACK and KEA Algorithm Specifications", version 2, 29 May 1998.
    • (1998) SKIPJACK and KEA Algorithm Specifications
  • 7
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • December
    • Mihir Bellare, Joe Kilian, and Phillip Rogaway. "The security of the cipher block chaining message authentication code". Journal of Computer and System Sciences, 61(3):362-399, December 2000.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 8
    • 0242656059 scopus 로고    scopus 로고
    • T. Iwata, K. Kurosawa, OMAC: One-Key CBC MAC, in Fast Software Encryption, 10th International Workshop, FSE 2003, Lecture Notes in Computer Science, 2887,Thomas Johansson, ed., Springer-Verlag (2003), p.p. 129-153.
    • T. Iwata, K. Kurosawa, "OMAC: One-Key CBC MAC", in Fast Software Encryption, 10th International Workshop, FSE 2003, Lecture Notes in Computer Science, Vol. 2887,Thomas Johansson, ed., Springer-Verlag (2003), p.p. 129-153.
  • 9
    • 33644943432 scopus 로고    scopus 로고
    • Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
    • NIST
    • NIST, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38B, 2005.
    • (2005) NIST Special Publication , vol.800-38B
  • 10
    • 84974571314 scopus 로고    scopus 로고
    • CBC MACs for arbitrary-length messages: The three key constructs
    • Advances in Cryptology, CRYPTO 2000, Springer-Verlag
    • J. Black and P. Rogaway. "CBC MACs for arbitrary-length messages: The three key constructs". Advances in Cryptology, CRYPTO 2000, LNCS 1880, pp. 197-215, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1880 , pp. 197-215
    • Black, J.1    Rogaway, P.2
  • 11
    • 26444574670 scopus 로고    scopus 로고
    • Chris Karlof, Naveen Sastry, David Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
    • Chris Karlof, Naveen Sastry, David Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
  • 12
    • 26444575926 scopus 로고    scopus 로고
    • A New MAC Construction ALRED and a Specific Instance ALPHA-MAC, Fast Software Encryption, FSE'05
    • J Daemen and V. Rijmen. "A New MAC Construction ALRED and a Specific Instance ALPHA-MAC", Fast Software Encryption, FSE'05, LNCS 3557, pp. 1-17, 2005.
    • (2005) LNCS , vol.3557 , pp. 1-17
    • Daemen, J.1    Rijmen, V.2
  • 13
    • 33746720876 scopus 로고    scopus 로고
    • Provably Secure MACs from Dif ferentially-Uniform Permutations and AES-Based Implementations
    • In the Proceedings of FSE
    • K. Minematsu and Y. Tsunoo, "Provably Secure MACs from Dif ferentially-Uniform Permutations and AES-Based Implementations", In the Proceedings of FSE 2006, LNCS 4047, pp. 226-241, 2006.
    • (2006) LNCS , vol.4047 , pp. 226-241
    • Minematsu, K.1    Tsunoo, Y.2
  • 14
    • 74049110975 scopus 로고    scopus 로고
    • Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
    • Z. Yuan, K. Jia, W. Wang, X. Wang, "Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC", IACR ePrint Archive.
    • IACR ePrint Archive
    • Yuan, Z.1    Jia, K.2    Wang, W.3    Wang, X.4
  • 16
  • 17
    • 79251551155 scopus 로고    scopus 로고
    • The Pelican MAC Function
    • Cryptology ePrint Archive, Report 2005/088
    • Joan Daemen and Vincent Rijmen. "The Pelican MAC Function". Cryptology ePrint Archive, Report 2005/088, 2005.
    • (2005)
    • Daemen, J.1    Rijmen, V.2
  • 18
    • 0242656061 scopus 로고    scopus 로고
    • A concrete security analysis for 3GPP-MAC
    • T. Johansson, editor, Fast Software Encryption, FSE, of, Springer-Verlag, Berlin Germany
    • D. Hong, J-S. Kang, B. Preneel and H. Ryu. "A concrete security analysis for 3GPP-MAC". In T. Johansson, editor, Fast Software Encryption, FSE 2003, volume 2887 of Lecture Notes in Computer Science, pages 154-169. Springer-Verlag, Berlin Germany, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2887 , pp. 154-169
    • Hong, D.1    Kang, J.-S.2    Preneel, B.3    Ryu, H.4
  • 19
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Eli Biham and Adi Shamir. "Differential cryptanalysis of DES-like cryptosystems", Journal of Cryptology, 4(1):3-72, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 20
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Advances in Cryptology-Eurocrypt, of, pages, Springer-Verlag
    • Mitsuru Matsui. "Linear cryptanalysis method for DES cipher", In Advances in Cryptology-Eurocrypt 1993, volume 765 of LNCS, pages386-397. Springer-Verlag, 1993.
    • (1993) LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 21
    • 74049104936 scopus 로고    scopus 로고
    • Square attacks on reduced-round variants of the Skipjack block cipher
    • COSIC Internal Report, January
    • J. Nakahara Jr., B. Preneel and J. Vandewalle, "Square attacks on reduced-round variants of the Skipjack block cipher", COSIC Internal Report, January 2001.
    • (2001)
    • Nakahara Jr., J.1    Preneel, B.2    Vandewalle, J.3
  • 22
    • 33750843983 scopus 로고    scopus 로고
    • Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker
    • Proc. of CHES, Springer-Verlag
    • S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, and M. Schimmler. "Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker". In Proc. of CHES 2006, volume 4249, pages 101-118. Springer-Verlag, LNCS, 2006.
    • (2006) LNCS , vol.4249 , pp. 101-118
    • Kumar, S.1    Paar, C.2    Pelzl, J.3    Pfeiffer, G.4    Schimmler, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.