Lecture

Message Authentication Codes: Formalism

Description

This lecture covers the concept of message authentication codes (MACs) and their formalism, focusing on the case study of mobile telephony. The instructor explains the process of processing with extra data, CCM, GCM mode, and GCM. Various aspects such as misuse attacks on GCM, authenticated modes to remember, and security notions related to integrity and authentication are discussed. The lecture delves into topics like commitment schemes, key derivation functions, pseudorandom generators, cryptographic hash functions, and the security of message authentication codes against key recovery and forgery. A case study on mobile telephony, specifically GSM architecture, slang, protocol, peer authentication, encryption, privacy protections, and improvements in 3G mobile telephony, is presented.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.