System and method for enabling authentication at different authentication strength-performance levels
First Claim
Patent Images
1. An authentication method, comprising:
- (a) generating a plurality of authentication tags for a message, each of said plurality of authentication tags reflecting a different authentication strength; and
(b) transmitting said plurality of authentication tags in association with said message to at least one receiver;
wherein two or more of said plurality of authentication tags are generated using a nested structure that includes a plurality of inner functions that are each operative on a particular collection of message parts to produce a plurality of intermediate hash results, wherein a plurality of distinct combinations of one or more of said plurality of intermediate hash results are used by an outer hash function to produce said two or more authentication tags.
10 Assignments
0 Petitions
Accused Products
Abstract
A system and method for generating a plurality of authentication tags using a plurality of authentication mechanisms is disclosed. The plurality of authentication tags can reflect different authentication strength-performance levels. It is a feature of the present invention that a receiver is afforded increased flexibility in adaptively choosing strength-performance levels. It is a further feature of the present invention that multiple authentication tags can be used in multicast environments, where different receivers may have different processor capabilities or security policies.
70 Citations
21 Claims
-
1. An authentication method, comprising:
-
(a) generating a plurality of authentication tags for a message, each of said plurality of authentication tags reflecting a different authentication strength; and
(b) transmitting said plurality of authentication tags in association with said message to at least one receiver;
wherein two or more of said plurality of authentication tags are generated using a nested structure that includes a plurality of inner functions that are each operative on a particular collection of message parts to produce a plurality of intermediate hash results, wherein a plurality of distinct combinations of one or more of said plurality of intermediate hash results are used by an outer hash function to produce said two or more authentication tags. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
2. An authentication method, comprising:
-
(a) generating a plurality of collections of parts of said message;
(b) processing each of said plurality of collections of message parts using a respective inner hash function to produce a plurality of intermediate hash results;
(c) processing a plurality of distinct combinations of said plurality of intermediate hash results using an outer hash function to produce a plurality of authentication tags; and
(d) transmitting said plurality of authentication tags in association with said message to at least one receiver. - View Dependent Claims (3, 4, 5, 6, 15, 16, 17, 18, 19, 20, 21)
-
Specification