• DocumentCode
    834359
  • Title

    Approximate Message Authentication Codes for N -ary Alphabets

  • Author

    Ge, Renwei ; Arce, Gonzalo R. ; Crescenzo, Giovanni Di

  • Volume
    1
  • Issue
    1
  • fYear
    2006
  • fDate
    3/1/2006 12:00:00 AM
  • Firstpage
    56
  • Lastpage
    67
  • Abstract
    Approximate message authentication codes (AMACs) for binary alphabets have been introduced recently as noise-tolerant authenticators. Different from conventional “hard” message authentications that are designed to detect even the slightest changes in messages, AMACs are designed to tolerate a small amount of noise in messages for applications where slight noise is acceptable, such as in multimedia communications. Binary AMACs, however, have several limitations. First, they do not naturally deal with messages having N -ary alphabets (N\\gg 2) . AMACs are distance-preserving codes; i.e., the distance between two authentication tags reflects the distance between two messages. Binary representation of N -ary alphabets, however, may destroy the original distance information between N -ary messages. Second, binary AMACs lack a means to adjust authentication sensitivity. Different applications may require different sensitivities against noise. AMACs for N -ary alphabets are designed as a cryptographic primitive to overcome the limitations of binary AMACs. N -ary AMACs not only directly process messages having N -ary alphabets but also provide sensitivity control on the authentication of binary and of N -ary messages. The generalized N -ary AMAC algorithm and its probabilistic model are developed. A statistical analysis characterizing the behavior of N -ary AMACs is provided along with the simulations illustrating their properties. Security analysis under chosen message attack is also developed.
  • Keywords
    Chosen message attack; hash function; message authentication code (MAC); multimedia message authentication; Analytical models; Collaborative work; Communication channels; Cryptography; Data security; Electric breakdown; Government; Message authentication; Multimedia communication; Statistical analysis; Chosen message attack; hash function; message authentication code (MAC); multimedia message authentication;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2005.863504
  • Filename
    1597135