Maximize
Bookmark

VX Heavens

Library Collection Sources Engines Constructors Simulators Utilities Links Forum

A Cryptographic Checksum for Integrity Protection

Fred Cohen
Computers and Security Volume 6, Issue 6, pp.505-510
ISSN 0167-4048
December 1987

9
[Back to index] [Comments (0)]

Abstract

This paper describes a cryptographic checksum technique for verifying the integrity of information in computer systems with no built-in protection. The technique is based on the use of repeated encryption using an RSA cryptosystem as a pseudo-random number generator (PRNG), the use of a user specified key as a seed for the PRNG, and reduction in a pseudo-random modulus as a means for mixing user specified information with generated numbers.

[Read the article]

deenesitfrplruua