Enhanced HMAC Based upon 3-D Rossler System
A new method for generating message authentication code with secret key HMAC is presented in this paper. 3-D chaotic Rossler System is used to generate the initial MASK, which is some kind of aliases used to achieve anonymity for the real sub-messages. Analysis study proved that HMAC is free of coll...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 469 |
---|---|
container_issue | |
container_start_page | 465 |
container_title | |
container_volume | |
creator | Idris, S. Zorkta, H. Khawatmi, S. Aiyash, W. |
description | A new method for generating message authentication code with secret key HMAC is presented in this paper. 3-D chaotic Rossler System is used to generate the initial MASK, which is some kind of aliases used to achieve anonymity for the real sub-messages. Analysis study proved that HMAC is free of collision hash MAC, and has high sensitivity to key-ciphertext, plaintext-ciphertext, error propagation effects, and more secure in comparison with its previous version . |
doi_str_mv | 10.1109/ICFCC.2009.71 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5189826</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5189826</ieee_id><sourcerecordid>5189826</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-a10b89ad1410213e98790e039ca054c43863f4262ef0b8794b0f15844a091a0e3</originalsourceid><addsrcrecordid>eNotjM9rwkAQhReK0Go99tRL7iXpTGZ_zdFutQoWwbZnWeOEpmiUrD343zdg3-V9PD6eUg8IBSLw8yLMQihKAC4c3qghOMuGDKMbqGE_e9ZkSd-qcUo_0McYTxru1NO0_Y5tJbts_j4J2UtMPf6ejm1G-Wu2Pqa0ly77uKSzHO7VoI77JOP_Hqmv2fQzzPPl6m0RJsu8QWfOeUTYeo471AglkrB3DALEVQSjK03eUq1LW0rdi471Fmo0XusIjBGERurx-tuIyObUNYfYXTYGPfvS0h8WlD42</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Enhanced HMAC Based upon 3-D Rossler System</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Idris, S. ; Zorkta, H. ; Khawatmi, S. ; Aiyash, W.</creator><creatorcontrib>Idris, S. ; Zorkta, H. ; Khawatmi, S. ; Aiyash, W.</creatorcontrib><description>A new method for generating message authentication code with secret key HMAC is presented in this paper. 3-D chaotic Rossler System is used to generate the initial MASK, which is some kind of aliases used to achieve anonymity for the real sub-messages. Analysis study proved that HMAC is free of collision hash MAC, and has high sensitivity to key-ciphertext, plaintext-ciphertext, error propagation effects, and more secure in comparison with its previous version .</description><identifier>ISBN: 0769535917</identifier><identifier>ISBN: 9780769535913</identifier><identifier>DOI: 10.1109/ICFCC.2009.71</identifier><identifier>LCCN: 2008943634</identifier><language>eng</language><publisher>IEEE</publisher><subject>Bifurcation ; Chaos ; Chaotic communication ; Cryptography ; Differential equations ; Digital Signature ; Digital signatures ; Hash functions ; Integrity ; Limit-cycles ; Message authentication ; State-space methods ; Zinc</subject><ispartof>2009 International Conference on Future Computer and Communication, 2009, p.465-469</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5189826$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5189826$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Idris, S.</creatorcontrib><creatorcontrib>Zorkta, H.</creatorcontrib><creatorcontrib>Khawatmi, S.</creatorcontrib><creatorcontrib>Aiyash, W.</creatorcontrib><title>Enhanced HMAC Based upon 3-D Rossler System</title><title>2009 International Conference on Future Computer and Communication</title><addtitle>ICFCC</addtitle><description>A new method for generating message authentication code with secret key HMAC is presented in this paper. 3-D chaotic Rossler System is used to generate the initial MASK, which is some kind of aliases used to achieve anonymity for the real sub-messages. Analysis study proved that HMAC is free of collision hash MAC, and has high sensitivity to key-ciphertext, plaintext-ciphertext, error propagation effects, and more secure in comparison with its previous version .</description><subject>Bifurcation</subject><subject>Chaos</subject><subject>Chaotic communication</subject><subject>Cryptography</subject><subject>Differential equations</subject><subject>Digital Signature</subject><subject>Digital signatures</subject><subject>Hash functions</subject><subject>Integrity</subject><subject>Limit-cycles</subject><subject>Message authentication</subject><subject>State-space methods</subject><subject>Zinc</subject><isbn>0769535917</isbn><isbn>9780769535913</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjM9rwkAQhReK0Go99tRL7iXpTGZ_zdFutQoWwbZnWeOEpmiUrD343zdg3-V9PD6eUg8IBSLw8yLMQihKAC4c3qghOMuGDKMbqGE_e9ZkSd-qcUo_0McYTxru1NO0_Y5tJbts_j4J2UtMPf6ejm1G-Wu2Pqa0ly77uKSzHO7VoI77JOP_Hqmv2fQzzPPl6m0RJsu8QWfOeUTYeo471AglkrB3DALEVQSjK03eUq1LW0rdi471Fmo0XusIjBGERurx-tuIyObUNYfYXTYGPfvS0h8WlD42</recordid><startdate>200904</startdate><enddate>200904</enddate><creator>Idris, S.</creator><creator>Zorkta, H.</creator><creator>Khawatmi, S.</creator><creator>Aiyash, W.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200904</creationdate><title>Enhanced HMAC Based upon 3-D Rossler System</title><author>Idris, S. ; Zorkta, H. ; Khawatmi, S. ; Aiyash, W.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-a10b89ad1410213e98790e039ca054c43863f4262ef0b8794b0f15844a091a0e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Bifurcation</topic><topic>Chaos</topic><topic>Chaotic communication</topic><topic>Cryptography</topic><topic>Differential equations</topic><topic>Digital Signature</topic><topic>Digital signatures</topic><topic>Hash functions</topic><topic>Integrity</topic><topic>Limit-cycles</topic><topic>Message authentication</topic><topic>State-space methods</topic><topic>Zinc</topic><toplevel>online_resources</toplevel><creatorcontrib>Idris, S.</creatorcontrib><creatorcontrib>Zorkta, H.</creatorcontrib><creatorcontrib>Khawatmi, S.</creatorcontrib><creatorcontrib>Aiyash, W.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Idris, S.</au><au>Zorkta, H.</au><au>Khawatmi, S.</au><au>Aiyash, W.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Enhanced HMAC Based upon 3-D Rossler System</atitle><btitle>2009 International Conference on Future Computer and Communication</btitle><stitle>ICFCC</stitle><date>2009-04</date><risdate>2009</risdate><spage>465</spage><epage>469</epage><pages>465-469</pages><isbn>0769535917</isbn><isbn>9780769535913</isbn><abstract>A new method for generating message authentication code with secret key HMAC is presented in this paper. 3-D chaotic Rossler System is used to generate the initial MASK, which is some kind of aliases used to achieve anonymity for the real sub-messages. Analysis study proved that HMAC is free of collision hash MAC, and has high sensitivity to key-ciphertext, plaintext-ciphertext, error propagation effects, and more secure in comparison with its previous version .</abstract><pub>IEEE</pub><doi>10.1109/ICFCC.2009.71</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0769535917 |
ispartof | 2009 International Conference on Future Computer and Communication, 2009, p.465-469 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5189826 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Bifurcation Chaos Chaotic communication Cryptography Differential equations Digital Signature Digital signatures Hash functions Integrity Limit-cycles Message authentication State-space methods Zinc |
title | Enhanced HMAC Based upon 3-D Rossler System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T16%3A09%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Enhanced%20HMAC%20Based%20upon%203-D%20Rossler%20System&rft.btitle=2009%20International%20Conference%20on%20Future%20Computer%20and%20Communication&rft.au=Idris,%20S.&rft.date=2009-04&rft.spage=465&rft.epage=469&rft.pages=465-469&rft.isbn=0769535917&rft.isbn_list=9780769535913&rft_id=info:doi/10.1109/ICFCC.2009.71&rft_dat=%3Cieee_6IE%3E5189826%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5189826&rfr_iscdi=true |