METHOD OF GENERATING MESSAGE AUTHENTICATION CODE USING STREAM CIPHER AND AUTHENTICATION/ENCRYPTION AND AUTHENTICATION/DECRYPTION METHODS USING STREAM CIPHER
First Claim
1. A method of generating a Message Authentication Code (MAC) using a stream cipher, comprising the steps of:
- (a) dividing an input message M into k n-bit message blocks;
(b) encrypting the respective divided input message blocks using a result obtained by exclusive-ORing (XORing) a secret key KMAC for MAC generation with a number among the number k of the message blocks divided in step (a), as a key, and calculating respective intermediate values;
(c) XORing the respective intermediate values resulting from step (b); and
(d) encrypting, at a key stream generator, the result of step (c) using the secret key KMAC for MAC generation and generating a MAC.
2 Assignments
0 Petitions
Accused Products
Abstract
Provided are a method of generating a Message Authentication Code (MAC) using a stream cipher, and authentication/encryption and authentication/decryption methods using a stream cipher.
According to the methods, authentication/encryption is performed using a MAC generated using a stream cipher as an initialization vector of the stream cipher. Therefore, it is unnecessary to use a random number generation algorithm to generate the initialization vector, and thus implementation efficiency can be improved.
In addition, upon generation of a MAC, a plurality of key stream generators perform computation for a plurality of message blocks, respectively. Therefore, the message blocks are computed in parallel at a time, and thus computation efficiency is excellent.
-
Citations
12 Claims
-
1. A method of generating a Message Authentication Code (MAC) using a stream cipher, comprising the steps of:
-
(a) dividing an input message M into k n-bit message blocks; (b) encrypting the respective divided input message blocks using a result obtained by exclusive-ORing (XORing) a secret key KMAC for MAC generation with a number among the number k of the message blocks divided in step (a), as a key, and calculating respective intermediate values; (c) XORing the respective intermediate values resulting from step (b); and (d) encrypting, at a key stream generator, the result of step (c) using the secret key KMAC for MAC generation and generating a MAC. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An authentication/encryption method using a stream cipher, comprising the steps of:
-
(a) inputting a plaintext M and a secret key KMAC for Message Authentication Code (MAC) generation and generating a MAC MAC(KMAC, M) for the plaintext M; (b) setting the MAC MAC(KMAC, M) generated in step (a) as a stream cipher initialization vector IV; (c) generating an n-bit key stream using the MAC MAC(KMAC, M), which is the stream cipher initialization vector IV, and a secret key KENC for message encryption; (d) exclusive-ORing (XORing) the generated key stream with the plaintext M to generate a ciphertext C; and (e) outputting the ciphertext C.
-
-
9. An authentication/decryption method using a stream cipher, comprising the steps of:
-
(a) generating a key stream using a stream cipher initialization vector IV and a secret key KENC for message encryption; and (b) exclusive-ORing (XORing) the key stream with a ciphertext C to generate a plaintext M. - View Dependent Claims (10, 11, 12)
-
Specification