AEC: A Practical Scheme for Authentication with Error Correction

We present a Message Authentication Code (MAC) with integrated error correction capability, called AEC. The MAC itself can detect/correct errors upto a certain limit and provides an estimate of the number and location of the errors. The security of AEC lies in the random selection of the underlying error correcting code (ECC). In this work, we propose a new on-the-fly solution to this problem of random ECC selection, making it highly secure. Moreover, this solution combined with the simple and regular structure of Cellular Automata (CA) based ECC, makes it highly suitable for efficient hardware implementation. Detailed FPGA implementations of both standalone and compact variants of AEC, are presented on the Spartan-3 FPGA platform. The compact implementation has low area footprint and high throughput making it particularly suitable for resource constrained applications. To the best of our knowledge this is the only practical design of an ECC-MAC scheme.

[1]  Dipanwita Roy Chowdhury,et al.  An Integrated ECC-MAC Based on RS Code , 2009, Trans. Comput. Sci..

[2]  Dipanwita Roy Chowdhury,et al.  Nmix: An Ideal Candidate for Key Mixing , 2009, SECRYPT.

[3]  Yvo Desmedt,et al.  Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.

[4]  C. D. Martinez,et al.  Random number generators using Cellular Automata implemented on FPGAs , 2012, Proceedings of the 2012 44th Southeastern Symposium on System Theory (SSST).

[5]  S. Wolfram Random sequence generation by cellular automata , 1986 .

[6]  Solomon W. Golomb,et al.  Shift Register Sequences , 1981 .

[7]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.

[8]  Yu Liu,et al.  The CRC-NTMAC for noisy message authentication , 2006, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[9]  Y. Liu,et al.  The BCH-NTMAC for Noisy Message Authentication , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[10]  Jon C. Muzio,et al.  Synthesis of one-dimensional linear hybrid cellular automata , 1996, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[11]  Hugo Krawczyk,et al.  LFSR-based Hashing and Authentication , 1994, CRYPTO.

[12]  Michael O. Rabin,et al.  Probabilistic Algorithms in Finite Fields , 1980, SIAM J. Comput..

[13]  Maurice Mignotte,et al.  Mathematics for computer algebra , 1991 .

[14]  Charles G. Boncelet The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.

[15]  Santanu Chattopadhyay,et al.  Additive cellular automata : theory and applications , 1997 .