Featured Research

from universities, journals, and other organizations

New Authentication Code Urged For Digital Data

Date:
June 4, 2005
Source:
National Institute Of Standards And Technology
Summary:
The National Institute of Standards and Technology (NIST) is recommending a new algorithm for authenticating digital data for federal agencies. Called CMAC (cipher-based message authentication code), the algorithm can authenticate the source of digital data, such as messages sent over the Internet, and thus provide assurance that the data have not been modified either intentionally or accidentally.

The National Institute of Standards and Technology (NIST) is recommending a new algorithm for authenticating digital data for federal agencies. Called CMAC (cipher-based message authentication code), the algorithm can authenticate the source of digital data, such as messages sent over the Internet, and thus provide assurance that the data have not been modified either intentionally or accidentally.

Related Articles


The main component of CMAC is a block cipher. Within encryption algorithms, block ciphers are used to scramble the data after they are broken down into blocks. In CMAC, the block cipher creates a digital tag that authorized parties can use to verify that the received message has not been altered.

Other authentication mechanisms, such as the hash function message authentication code (HMAC) and digital signatures, have long been available. CMAC is a new option, intended especially for devices in which a block cipher is more readily available than the components of these other mechanisms.

CMAC was submitted to NIST as part of an ongoing public effort to develop and update block cipher-based algorithms, called modes of operation. A team of Japanese scientists, Tetsu Iwata and Kaoru Kurosawa of Ibaraki University, developed CMAC based on an earlier proposal by a team of American scientists, John Black of the University of Nevada, Reno, and Philip Rogaway of the University of California at Davis.

Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication (NIST Special Publication 800-38B) is available at http://csrc.nist.gov/publications/nistpubs/index.html#sp800-38B. It is the third of a series of publications recommending modes of operation to provide confidentiality or authentication for digital data. For more information, see http://csrc.nist.gov/CryptoToolkit/modes/.


Story Source:

The above story is based on materials provided by National Institute Of Standards And Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute Of Standards And Technology. "New Authentication Code Urged For Digital Data." ScienceDaily. ScienceDaily, 4 June 2005. <www.sciencedaily.com/releases/2005/06/050604184813.htm>.
National Institute Of Standards And Technology. (2005, June 4). New Authentication Code Urged For Digital Data. ScienceDaily. Retrieved February 27, 2015 from www.sciencedaily.com/releases/2005/06/050604184813.htm
National Institute Of Standards And Technology. "New Authentication Code Urged For Digital Data." ScienceDaily. www.sciencedaily.com/releases/2005/06/050604184813.htm (accessed February 27, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Friday, February 27, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Lenovo Hack May Be Retaliation For 'Superfish' Vulnerability

Lenovo Hack May Be Retaliation For 'Superfish' Vulnerability

Newsy (Feb. 26, 2015) Lenovo&apos;s website was hacked by what appears to be the infamous Lizard Squad group. The attack seems to be related to Lenovo&apos;s "Superfish" controversy. Video provided by Newsy
Powered by NewsLook.com
Cyber Criminals Holding Phone and Computer Data to Ransom

Cyber Criminals Holding Phone and Computer Data to Ransom

AFP (Feb. 26, 2015) Computer and smartphone viruses are holding an increasing number of devices hostage using “ransomware.” Duration:02:21 Video provided by AFP
Powered by NewsLook.com
China Shuns Big Tech Names

China Shuns Big Tech Names

Reuters - Business Video Online (Feb. 26, 2015) The Chinese government has taken products from major tech firms off its purchase list in favour of smaller domestic players, but experts warn the plan may backfire making them open to security risks. Eve Johnson reports. Video provided by Reuters
Powered by NewsLook.com
Apple Reveals Potential Date For Apple Watch Reveal

Apple Reveals Potential Date For Apple Watch Reveal

Newsy (Feb. 26, 2015) The company sent out announcements for a March 9 media event with a simple message, "Spring forward." Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins