The CRC–NTMAC for Noisy Message Authentication

We present a new message authentication code (MAC) called the cyclic redundancy check-noise-tolerant message authentication code (CRC-NTMAC). The CRC-NTMAC improves upon the recently developed NTMAC. Unlike conventional MACs, such as the keyed-hash MAC (HMAC), the CRC-NTMAC and NTMAC tolerate a modest number of errors, such as might be caused by a noisy communications channel. Furthermore, both new MACs provide estimates of the number and locations of the errors. The CRC-NTMAC, however, provides better estimates and has a lower false acceptance probability. The CRC-NTMAC is also not based on cryptographic hash functions

[1]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[2]  William Stallings Computer Networking with Internet Protocols and Technology , 2003 .

[3]  Frank E. Grubbs,et al.  An Introduction to Probability Theory and Its Applications , 1951 .

[4]  Peter Sweeney Error Control Coding , 1991 .

[5]  Oliver Pretzel Error-Correcting Codes and Finite Fields , 1992 .

[6]  W. W. Peterson,et al.  Error-Correcting Codes. , 1962 .

[7]  Cheryl Madson,et al.  The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.

[8]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[9]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[10]  W. W. Peterson,et al.  Cyclic Codes for Error Detection , 1961, Proceedings of the IRE.

[11]  H. Feistel Cryptography and Computer Privacy , 1973 .

[12]  Martin Herrmann,et al.  Optimization of cyclic redundancy-check codes with 24 and 32 parity bits , 1993, IEEE Trans. Commun..

[13]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[14]  Terry Ritter The great CRC mystery , 1986 .

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Giovanni Di Crescenzo,et al.  Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.

[17]  Charles G. Boncelet The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.