PARITY CHECK MESSAGE AUTHENTICATION CODE
    9.
    发明申请

    公开(公告)号:US20170366355A1

    公开(公告)日:2017-12-21

    申请号:US15188937

    申请日:2016-06-21

    Abstract: The invention provides a method and system for authenticating a plaintext message at a sender computing device and verifying the integrity and authenticity of the plaintext message at a receiver computing device. Firstly, the method includes prepending a random string to the plaintext message and then generating a ciphertext corresponding to the plaintext message by encrypting the plaintext message prepended with the random string using an encryption algorithm. The method also includes the step of generating a compressed image of the plaintext message and generates an authentication tag from the compressed image of the plaintext message and the random string. Thereafter, the method transmits both the ciphertext and the authentication tag generated at the sender computing device to the receiver computing device. The receiver computing device, on receiving the ciphertext and the authentication tag corresponding to the plaintext message, verifies the integrity and authenticity of the plaintext message.

    RESIDUE MESSAGE AUTHENTICATION CODE
    10.
    发明申请

    公开(公告)号:US20170366354A1

    公开(公告)日:2017-12-21

    申请号:US15188921

    申请日:2016-06-21

    CPC classification number: H04L9/3242 H04L9/0643 H04L63/123 H04L63/126

    Abstract: The invention provides a method and system for generating a message authentication code (MAC) for authenticating a message and for verifying the integrity and authenticity of the message. The method for generating the MAC for authenticating the message includes the step of compressing the message to generate a fixed-size residue of the message. The fixed-size residue of the message is computed from the message modulo a divisor. The method, then, multiplies the fixed-size residue of the message by an authentication key. Thereafter, the method computes an authentication tag for the message by encrypting the fixed-size residue of the message utilizing a semantically secure encryption algorithm. The method, then, transmits both the message and the authentication tag of the message from a sender computing device to a receiver computing device where the method verifies the integrity and authenticity of the message using the authentication key.

Patent Agency Ranking