Visible to the public A New Homomorphic Message Authentication Code Scheme for Network Coding

TitleA New Homomorphic Message Authentication Code Scheme for Network Coding
Publication TypeConference Paper
Year of Publication2020
AuthorsKamal, A., Dahshan, H., Elbayoumy, A. D.
Conference Name2020 3rd International Conference on Information and Computer Technologies (ICICT)
Keywordsaccess protocols, authentication, composability, encoding, Encryption, homomorphic mac, homomorphic MAC scheme, homomorphic message authentication code, known-plaintext attacks, MAC length, message authentication, Metrics, network coding, network data flow, packet decoding, Pollution, pollution attacks, pubcrawl, resilience, Resiliency, security parameter, some what homomorphic encryption, telecommunication security, vector length
AbstractNetwork coding (NC) can significantly increase network performance and make lossy networks more reliable. Since the middle nodes modify the packets during their path to destination, integrity of the original packets cannot be checked using classical methods (MACs, Signatures, etc). Though, pollution attacks are the most common threat to network coded systems, where an infected node can inject the data flow of a network with a number of false packets and ban the receiver from properly decoding the packets. A lot of work in the security of NC in resisting pollution attacks has been investigated in recent years, majority have the same security parameter 1/q. A Homomorphic MAC scheme is presented earlier to resist pollution attacks with a security level 1/q^l, In this paper, we will show that the mentioned scheme is subject to known-plaintext attacks. This is due to that part of the key can be revealed in an initial process. Also, the whole key could be revealed if the key is used more than once. Then, a modification to the mentioned scheme is proposed to overcome this issue. Besides, the MAC length is adjustable according to the required security level and not variable according to the vector's length which will accordingly increase the performance and efficiency of the scheme.
DOI10.1109/ICICT50521.2020.00088
Citation Keykamal_new_2020