Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Chosen message attack against Mukherjee-Ganguly-Chaudhuri's message authentication scheme*

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Mun-Kyu-
dc.contributor.authorHong, Do Won-
dc.contributor.authorKim, Dong Kyue-
dc.date.accessioned2022-12-21T05:23:37Z-
dc.date.available2022-12-21T05:23:37Z-
dc.date.created2022-09-16-
dc.date.issued2007-11-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/179352-
dc.description.abstractSince Wolfram proposed to use cellular automata as pseudorandom sequence generators, many cryptographic applications using cellular automata have been introduced. One of the recent one is Mukherjee, Ganguly, and Chaudhuri's message authentication scheme using a special class of cellular automata called Single Attractor Cellular Automata (SACA). In this paper, we show that their scheme is vulnerable to a chosen-message attack, i.e., the secret key can be recovered by an attacker using only several chosen message-MAC pairs. The weakness of the scheme results from the regularity of SACA.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titleChosen message attack against Mukherjee-Ganguly-Chaudhuri's message authentication scheme*-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Dong Kyue-
dc.identifier.doi10.1007/978-3-540-74377-4_45-
dc.identifier.scopusid2-s2.0-38349027409-
dc.identifier.bibliographicCitationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.4456 LNAI, pp.427 - 434-
dc.relation.isPartOfLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.titleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.volume4456 LNAI-
dc.citation.startPage427-
dc.citation.endPage434-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusCellular automata-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusComputer science-
dc.subject.keywordPlusCryptography-
dc.subject.keywordPlusMessage passing-
dc.subject.keywordPlusChosen message attack-
dc.subject.keywordPlusMessage authentication scheme-
dc.subject.keywordPlusPseudorandom sequence generators-
dc.subject.keywordPlusSingle Attractor Cellular Automata (SACA)-
dc.subject.keywordPlusData privacy-
dc.subject.keywordAuthorCellular automata-
dc.subject.keywordAuthorChosen message attack-
dc.subject.keywordAuthorCryptanalysis-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorMessage authentication scheme-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-540-74377-4_45-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dong Kyue photo

Kim, Dong Kyue
COLLEGE OF ENGINEERING (SCHOOL OF ELECTRONIC ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE