There is No Need to Waste Communication Bandwidth on MACs.

GIIS(2018)

引用 1|浏览13
暂无评分
摘要
We address the problem of detecting data corruption in computer and device communications without generating, transmitting or verifying integrity metadata. Such metadata typically hold mathematical summaries of the content which is being transmitted, such as checksums, Integrity Check Values (ICVs) or Message Authentication Codes (MACs), and are costly to generate and transmit. In the paper we discuss a data integrity methodology, which is alternative to MACs or ICVs, and is based on a novel concept of ‘implicit integrity’. Implicit integrity supports the detection of corruption based on the observation that regular unencrypted user data typically exhibit patterns, such as repeated bytes words etc. When some encrypted content becomes corrupted and is decrypted, it no longer exhibits patterns. It is the absence or presence of patterns in decrypted content which denotes whether some content is modified or not. In the paper we summarize some of our findings including discovered entropy properties of server and client data, security bounds associated with implicit integrity and proposals for constructions that are practical and can be used in communication systems, supporting implicit integrity at low cost.
更多
查看译文
关键词
Pattern matching,Protocols,Metadata,Servers,Encryption,Ciphers
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要