Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Incremental authentication of tree-structured documents

Ekdahl, Patrik LU and Smeets, Ben LU orcid (1999) 2nd International Conference on Information and Communication Security, ICICS 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1726. p.275-283
Abstract

A new message authentication code (MAC) is described that exploits the tree structure present in many modern document formats, e.g. SGML and XML. The new code supports incremental updating of the cryptographic checksum in the process of making incremental changes to the document. Theoretical bounds on the probability of a successful substitution attack are derived. Through experimental results we demonstrate that for randomly chosen messages the success probability of such an attack will be smaller and is easily identified.

Please use this url to cite or link to this publication:
author
and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
Information and Communication Security : 2nd International Conference, ICICS 1999, Proceedings - 2nd International Conference, ICICS 1999, Proceedings
series title
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
editor
Varadharajan, Vijay and Mu, Yi
volume
1726
pages
9 pages
publisher
Springer
conference name
2nd International Conference on Information and Communication Security, ICICS 1999
conference location
Sydney, Australia
conference dates
1999-11-09 - 1999-11-11
external identifiers
  • scopus:84958658864
ISSN
0302-9743
1611-3349
ISBN
3540666826
9783540666820
978-3-540-47942-0
DOI
10.1007/978-3-540-47942-0_23
language
English
LU publication?
yes
additional info
Publisher Copyright: © Springer-Verlag Berlin Heidelberg 1999.
id
487a1aa9-a558-47fb-a201-ca54a8ec8f48
date added to LUP
2021-11-05 02:33:37
date last changed
2024-01-05 19:59:54
@inproceedings{487a1aa9-a558-47fb-a201-ca54a8ec8f48,
  abstract     = {{<p>A new message authentication code (MAC) is described that exploits the tree structure present in many modern document formats, e.g. SGML and XML. The new code supports incremental updating of the cryptographic checksum in the process of making incremental changes to the document. Theoretical bounds on the probability of a successful substitution attack are derived. Through experimental results we demonstrate that for randomly chosen messages the success probability of such an attack will be smaller and is easily identified.</p>}},
  author       = {{Ekdahl, Patrik and Smeets, Ben}},
  booktitle    = {{Information and Communication Security : 2nd International Conference, ICICS 1999, Proceedings}},
  editor       = {{Varadharajan, Vijay and Mu, Yi}},
  isbn         = {{3540666826}},
  issn         = {{0302-9743}},
  language     = {{eng}},
  pages        = {{275--283}},
  publisher    = {{Springer}},
  series       = {{Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}},
  title        = {{Incremental authentication of tree-structured documents}},
  url          = {{http://dx.doi.org/10.1007/978-3-540-47942-0_23}},
  doi          = {{10.1007/978-3-540-47942-0_23}},
  volume       = {{1726}},
  year         = {{1999}},
}