Incremental authentication of tree-structured documents
(1999) 2nd International Conference on Information and Communication Security, ICICS 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1726. p.275-283- Abstract
A new message authentication code (MAC) is described that exploits the tree structure present in many modern document formats, e.g. SGML and XML. The new code supports incremental updating of the cryptographic checksum in the process of making incremental changes to the document. Theoretical bounds on the probability of a successful substitution attack are derived. Through experimental results we demonstrate that for randomly chosen messages the success probability of such an attack will be smaller and is easily identified.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/487a1aa9-a558-47fb-a201-ca54a8ec8f48
- author
- Ekdahl, Patrik LU and Smeets, Ben LU
- organization
- publishing date
- 1999
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- Information and Communication Security : 2nd International Conference, ICICS 1999, Proceedings - 2nd International Conference, ICICS 1999, Proceedings
- series title
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- editor
- Varadharajan, Vijay and Mu, Yi
- volume
- 1726
- pages
- 9 pages
- publisher
- Springer
- conference name
- 2nd International Conference on Information and Communication Security, ICICS 1999
- conference location
- Sydney, Australia
- conference dates
- 1999-11-09 - 1999-11-11
- external identifiers
-
- scopus:84958658864
- ISSN
- 0302-9743
- 1611-3349
- ISBN
- 3540666826
- 9783540666820
- 978-3-540-47942-0
- DOI
- 10.1007/978-3-540-47942-0_23
- language
- English
- LU publication?
- yes
- additional info
- Publisher Copyright: © Springer-Verlag Berlin Heidelberg 1999.
- id
- 487a1aa9-a558-47fb-a201-ca54a8ec8f48
- date added to LUP
- 2021-11-05 02:33:37
- date last changed
- 2024-01-05 19:59:54
@inproceedings{487a1aa9-a558-47fb-a201-ca54a8ec8f48, abstract = {{<p>A new message authentication code (MAC) is described that exploits the tree structure present in many modern document formats, e.g. SGML and XML. The new code supports incremental updating of the cryptographic checksum in the process of making incremental changes to the document. Theoretical bounds on the probability of a successful substitution attack are derived. Through experimental results we demonstrate that for randomly chosen messages the success probability of such an attack will be smaller and is easily identified.</p>}}, author = {{Ekdahl, Patrik and Smeets, Ben}}, booktitle = {{Information and Communication Security : 2nd International Conference, ICICS 1999, Proceedings}}, editor = {{Varadharajan, Vijay and Mu, Yi}}, isbn = {{3540666826}}, issn = {{0302-9743}}, language = {{eng}}, pages = {{275--283}}, publisher = {{Springer}}, series = {{Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}}, title = {{Incremental authentication of tree-structured documents}}, url = {{http://dx.doi.org/10.1007/978-3-540-47942-0_23}}, doi = {{10.1007/978-3-540-47942-0_23}}, volume = {{1726}}, year = {{1999}}, }