Access the full text.
Sign up today, get DeepDyve free for 14 days.
L. Gong (1990)
Verifiable-text attacks in cryptographic protocolsProceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration
S. Kent, J. Linn (1987)
Privacy enhancement for Internet electronic mail: Part II - certificate-based key managementRFC, 1114
J. Linn (1989)
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication proceduresRFC, 1040
J. Steiner, C. Neuman, J. Schiller (1988)
An authentication service for open network systems
M. Lomas, L. Gong, Jerome Saltzery, R. Needham (1989)
Reducing risks from poorly chosen keys
R. Needham, M. Schroeder (1978)
Using encryption for authentication in large networks of computersCommun. ACM, 21
(1986)
American National Standard, \Financial Institution Message Authentication (Wholesale)
A Note on Redundanc y in Encrypted Message s Li Gong* University of Cambridge Computer Laborator y Cambridge CB2 3QG, England June 199 0 Abstract . In a cryptographic protocol, it is important for a recipient t o determine that a message has not been modified during transmission . This is normally achieved by providing redundancy in the message . Typically, a message is described in the literature as containing enough redundancy, no t enough redundancy, or no redundancy at all . This note shows that, because of the secrecy that comes with encryption, redundancy can be provided at two different levels . An example demonstrates that this distinction is useful in guarding against certain cryptographic attacks on weak keys . 1 Introductio n Redundancy of a message, usually defined in terms of information entropy , is the redundancy of the source that generates the message . Without such redundancy, one cannot determine if a message is genuine . In particular , to interpret an encrypted message, a recipient must be assured that he ha s used the correct key for decryption and the ciphertext has not been modifie d The author is currently with Odyssey Research Associates,
ACM SIGCOMM Computer Communication Review – Association for Computing Machinery
Published: Oct 1, 1990
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.