Security Analysis of CMAC in the Multi-user Model

被引:0
|
作者
Zhang, Xiangyang [1 ]
Shen, Yaobin [2 ]
Wang, Lei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Xiamen Univ, Xiamen 361005, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
CMAC; OMAC1; Multi-User Security; MAC; Message Authentication Code; ARBITRARY-LENGTH MESSAGES; CBC MACS; OMAC; TMAC; BOUNDS; SUM;
D O I
10.1007/978-3-031-75757-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CMAC, also known as OMAC1, is an efficient message authentication code (MAC) and has been standardized by NIST and other organizations. It has been widely applied in IPSec, IKE and many wireless networks. Multi-user security captures a practical scenario where an adversary targets a particular service related to multiple users. Lots of MAC constructions have been rigorously analyzed in the multi-user model. However, the concrete analysis for CMAC in the multi-user model is still a blank in the literature. To fill the gap, we provide a concrete multi-user security bound for CMAC in this paper. Our bound is better than that from generic reduction and we observe that the online security of CMAC in the multi-user model does not degrade from the single-user model.
引用
收藏
页码:67 / 86
页数:20
相关论文
共 50 条
  • [41] Large Scale Analysis of RBD Precoding for Physical Layer Security in Multi-User Wireless Networks
    Sadeghzadeh, Mehdi
    Maleki, Mehdi
    Salehi, Masoud
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [42] Integrated, Synchronous Multi-User Design and Analysis
    Briggs, Jared C.
    Hepworth, Ammon I.
    Stone, Brett R.
    Coburn, Josh Q.
    Jensen, C. Greg
    Red, Ed
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2015, 15 (03)
  • [43] Analysis of Superimposed LoRa in Multi-User Networks
    AlHamdani, Khalid
    Bariah, Lina
    Naser, Shimaa
    Muhaidat, Sami
    Al-Qutayri, Mahmoud
    Sofotasios, Paschalis C.
    2021 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET'21), 2021, : 248 - 253
  • [44] Large-Scale Analysis of Physical-Layer Security in Multi-User Wireless Networks
    Sadeghzadeh, Mehdi
    Maleki, Mehdi
    Salehi, Masoud
    Bahrami, Hamid Reza
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (12) : 6450 - 6462
  • [45] The Exact Multi-user Security of 2-Key Triple DES
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 112 - 135
  • [46] The Security of ChaCha20-Poly1305 in the Multi-User Setting
    Degabriele, Jean Paul
    Govinden, Jerome
    Guenther, Felix
    Paterson, Kenneth G.
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1981 - 2003
  • [47] Tight Multi-user Security of Ascon and Its Large Key Extension
    Chakraborty, Bishwajit
    Dhar, Chandranan
    Nandi, Mridul
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 57 - 76
  • [48] A Cooperative Jamming Based Security Algorithm for Multi-user MIMO Systems
    Song, Huawei
    Yang, Meiyue
    Xu, Xiangyang
    Luo, Wenyu
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 1557 - 1560
  • [49] The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
    Viet Tung Hoang
    Tessaro, Stefano
    Thiruvengadam, Aishwarya
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1429 - 1440
  • [50] On the Physical Layer Security of Multi-user Hybrid RF/VLC Networks
    Qiao, Jiajia
    Zhao, Xiang
    Sun, Yu
    2021 13TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2021), 2021, : 11 - 16