Home About IUP Magazines Journals Books Amicus Archives
     
A Guided Tour | Recommend | Links | Subscriber Services | Feedback | Subscribe Online
 
The IUP Journal of Computer Sciences :
A Novel High Security Message Authentication Code MACJER-320 and its Performance Evaluation
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 
 

This paper describes MACJER-320, a new Message Authentication Code (MAC) and evaluates its performance in comparison with a popular one, the keyed-Hash Message Authentication Code (HMAC). Both the MACs are based on hash functions, i.e., their security by and large depends on the strength of the underlying hash function. MACJER-320 uses JERIM-320, a 320-bit hash function, while HMAC uses a 160-bit hash function, the Secure Hash Algorithm (SHA-1). JERIM-320 is designed to operate on four parallel lines of message processing, resulting in higher degree of security than serial iterative hash functions like SHA-1. The performance evaluation of the two methods has been done by using practical implementation step computation methods.

Message Authentication Codes (MACs) form one of the fundamental cryptographic primitives, used extensively in providing security services for general digital data offering authentication, non-repudiation and data integrity. The sender and receiver share a common key K between the authorized entities, Alice and Bob. When Alice sends a message to Bob, she computes the MAC value of the message with the shared secret key and appends it to the message. Once Bob receives the message and the MAC value, he recomputes the MAC value of the obtained message with the key and verifies the authenticity of the message by checking if the recomputed MAC value is the same as the received MAC value. This ensures the sender's authenticity and non-repudiation. The algorithm producing the MAC is designed to reflect any changes in the message to ensure data integrity also. This MAC generation and verification is shown in Figure 1. The security of the MAC algorithm depends on the difficulty for an unauthorized entity to produce a forgery that is, a new message with a valid MAC.

The popular MAC mechanism used nowadays is the HMAC (Hash based Message Authentication Code) with MD5 or Secure Hash Algorithm (SHA-1) as the hash functions (Jongsung Kim et al., 2006). But, the strength of hash functions such as MD5 (Message Digest Algorithm 5) (Rivest, 1992) and SHA-1 (NIST-SHA, 2002) has been called into question as a result of recent findings. Hence, it is required to have a proven method to meet the future requirements. The analysis of MACJER-320 and its performance in comparison with the popular HMAC-SHA1 have been carried out in this context.

MACJER-320, a new message authentication code has been designed and its performance is compared with the popular HMAC using practical implementations and single step computations. MACJER-320 produces an output of 320 bit MAC code and hence it is more secure than the 160 bit MAC code produced by HMAC-SHA-1. Also due to the more number of operations performed in each message block, the MAC code produced by MACJER-320 is more secure as compared to HMAC-SHA-1. Since message integrity and authentication services are very important in today's high-speed network protocols and since the confidence level with the current candidates such as SHA-1 is coming down, new MAC schemes are necessary and more secure MAC codes like MACJER-320 could be an option.

 
 
 

High Security Message Authentication Code MACJER-320, Performance Evaluation, Hash Message Authentication Code, HMAC, Secure Hash Algorithm, security services, cryptographic primitives, MAC mechanism, MAC algorithm, authentication services, MAC schemes.