Skip to main content
Erschienen in:
Buchtitelbild

1996 | OriginalPaper | Buchkapitel

Keying Hash Functions for Message Authentication

verfasst von : Mihir Bellare, Ran Canetti, Hugo Krawczyk

Erschienen in: Advances in Cryptology — CRYPTO ’96

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis.We present new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitative way, that the schemes retain almost all the security of the underlying hash function. The performance of our schemes is essentially that of the underlying hash function. Moreover they use the hash function (or its compression function) as a black box, so that widely available library code or hardware can be used to implement them in a simple way, and replaceability of the underlying hash function is easily supported.

Metadaten
Titel
Keying Hash Functions for Message Authentication
verfasst von
Mihir Bellare
Ran Canetti
Hugo Krawczyk
Copyright-Jahr
1996
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-68697-5_1