Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A high speed manipulation detection code
Jueneman R.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)3461987.Type:Proceedings
Date Reviewed: Oct 1 1988

Manipulation detection codes (MDCs) are cryptographic check-sums applied to electronic machines, designed to detect intentional (or accidental) changes in the message. MDCs can be used in electronic funds transfer, satellite control, and other applications. The paper describes MDCs that are computed with publicly known quantities and later encrypted with a secret key.

The paper describes several possible threats facing the designer of an MDC, including:

  • (1) “Insider attack:” If an attacker is able to present legitimate messages for signature, he or she needs only to create a legitimate message and a bogus message with the same MDC in order to spoof the system. This is generally easier than producing a bogus message to match a given MDC.

  • (2) “Birthday attack:” In many instances, including the insider attack, one can spoof an n-bit MDC using computation time only the square-root of the apparent 2n.

  • (3) “Playback attack:” The attacker replays a previous valid message along with its signed MDC. This possibility necessitates a time-varying component of the MDC.

A secure MDC is difficult to achieve. The paper’s primary goal is a secure and computationally efficient MDC, dubbed QCMDCV4, based on modular arithmetic and bit manipulation. Here it fails; the described scheme is insecure (a fact apparently not noted elsewhere); its simple construction allows a direct attack. The reader is hereby warned against its implementation.

The author presents this fairly technical material in a manner accessible to a general engineering audience. The background material on attacks and applications is worthwhile. A more secure scheme in place of the QCMDCV4 would have been welcome.

Reviewer:  D. Coppersmith Review #: CR112545
Bookmark and Share
 
Cryptographic Controls (D.4.6 ... )
 
 
Authentication (D.4.6 ... )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy