Security Analysis of CMAC in the Multi-user Model

被引:0
|
作者
Zhang, Xiangyang [1 ]
Shen, Yaobin [2 ]
Wang, Lei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Xiamen Univ, Xiamen 361005, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
CMAC; OMAC1; Multi-User Security; MAC; Message Authentication Code; ARBITRARY-LENGTH MESSAGES; CBC MACS; OMAC; TMAC; BOUNDS; SUM;
D O I
10.1007/978-3-031-75757-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CMAC, also known as OMAC1, is an efficient message authentication code (MAC) and has been standardized by NIST and other organizations. It has been widely applied in IPSec, IKE and many wireless networks. Multi-user security captures a practical scenario where an adversary targets a particular service related to multiple users. Lots of MAC constructions have been rigorously analyzed in the multi-user model. However, the concrete analysis for CMAC in the multi-user model is still a blank in the literature. To fill the gap, we provide a concrete multi-user security bound for CMAC in this paper. Our bound is better than that from generic reduction and we observe that the online security of CMAC in the multi-user model does not degrade from the single-user model.
引用
收藏
页码:67 / 86
页数:20
相关论文
共 50 条
  • [31] (Strong) aPAKE Revisited: Capturing Multi-User Security and Salting
    Dayanikli, Dennis
    Lehmann, Anja
    9TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P 2024, 2024, : 415 - 439
  • [32] Multi-user security of the tweakable Even-Mansour cipher
    Zhang, Ping
    Yuan, Qian
    Hu, Honggang
    Wang, Peng
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (03)
  • [33] Signatures with Tight Multi-user Security from Search Assumptions
    Pan, Jiaxin
    Ringerud, Magnus
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 485 - 504
  • [34] Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
    Cogliati, Benoit
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (12) : 2747 - 2763
  • [35] Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model
    Han, Shuai
    Liu, Shengli
    Wang, Zhedong
    Gu, Dawu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 682 - 715
  • [36] Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
    Benoît Cogliati
    Designs, Codes and Cryptography, 2018, 86 : 2747 - 2763
  • [37] Turbo multi-user receiver for asynchronous multi-user OFDM systems
    Jung, HJ
    Zoltowski, MD
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 693 - 696
  • [38] MIMO Multi-User Secrecy Rate Analysis
    Geraci, Giovanni
    Singh, Sarabjot
    Andrews, Jeffrey G.
    Yuan, Jinhong
    Collings, Iain B.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 1023 - 1028
  • [39] Jamming-Assisted Multi-User Multi-Eavesdropper Broadcast Network: PHY Layer Security Analysis
    Hamyani, Asmaa
    El Bouanani, Faissal
    Miftah, Youssef
    IEEE ACCESS, 2021, 9 (118051-118064) : 118051 - 118064
  • [40] Distance Enumerator Analysis for Multi-User Codes
    Song, Guanghui
    Cheng, Jun
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 3137 - 3141