Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.6.105

Message Authentication Code based on k-invertible Matrices  

Lee Hee Jung (강남대학교)
Kim Tae Gwon (강남대학교)
Abstract
MAC is used for data origin authentication or message integrity protection. In Crypto'03 Cary and Venkatesan introduced new MAC based on unimodular matrix groups. It is to encrypt messages using private keys and to encrypt them again using public keys which are matrices whose determinants are $\pm$1. These matrices have property called k-invertible. This k effects on the collision probability of this new MAC. The smaller k is, the less collisions occur. Cary shows 6-invertible matrices, and 10-invertible matrices whose components are only 1, 0, -1. In this paper we figure out sufficient conditions about choosing 4 matrices among special 22 matrices. Also, we introduce 5-invertible matrices whose components are 1, 0, -1. Those have better efficiency and security.
Keywords
Message authentication; k-invertible matrix; Public key;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Mattew. Cary, Ramarathnam Venkatesan, 'A Message Authentication Code Based on Unimodular Matrix Groups', Crypto 2003, LNCS 2729, pp.500-512, 2003
2 J. Black, S .Halevi, H. Krawczyk, T. Krovetz, P. Rogaway, 'UMAC : Fast and Secure Message Authentication', Advances in Cryptology-Crypto '99, LNCS, vol. 1666, M. Wiener,ed. Springer-Verlag, pp.216-233, 1999
3 D. Bernstein, 'Factoring-point arithmetic arithmetic and message authentication', draft available as http://cr.yp.to/papers/hash127.dvi
4 임채훈, 이필중, '상호 신분인증 및 디지털 서명기법에 관한 연구', 정보보호학회논문지, 제2권 1호, 1992
5 Mariusz H. Jakubowski, R. Venkatesan, 'The chain and sum primitive and its application to MACs and stream ciphers', In Advances in Cryptology-Eurocrypt '98, vol.1403, LNCS, 281-293, Springer-Verlag, 1998   DOI   ScienceOn
6 Mihir Bellare, Joe Kilian, Phillip Rogaway, 'The security of the cipher block chaining message authentication code', Journal of computer and system science, 61(3), 362-399, 2000   DOI   ScienceOn
7 홍도원, 신상욱, 강주성, 이옥연, '3GPP MAC 알고리즘 안전성 분석', 정보보호학회논문지, 제11권 제2호, pp.52-59, 2001   과학기술학회마을