A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound

被引:4
|
作者
Yasuda, Kan [1 ]
机构
[1] NTT Corp, NTT Secure Platform Labs, Musashino, Tokyo 1808585, Japan
关键词
PMAC; checksum; tweakable PRF; compression function; finite field; system of linear equations; query length;
D O I
10.1587/transfun.E96.A.237
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this note we suggest a new parallelizable mode of operation for message authentication codes (MACs). The new MAC algorithm iterates a pseudo-random function (PRF) F-K : {0, 1}(m) -> {0, 1}(n), where K is a key and m, n are positive integers such that m >= 2n. The new construction is an improvement over a sequential MAC algorithm presented at FSE 2008, solving positively an open problem posed in the paper-the new mode is capable of fully parallel execution while achieving rate-1 efficiency and "full n-bit" security. Interestingly enough, PMAC-like parallel structure, rather than CBC-like serial iteration, has beneficial side effects on security. That is, the new construction is provided with a more straight-forward security proof and with an even better ("l-free") security bound than the FSE 2008 construction.
引用
收藏
页码:237 / 241
页数:5
相关论文
共 8 条
  • [1] Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
    Moch, Alexander
    List, Eik
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 131 - 151
  • [2] Beyond Birthday Bound Secure MAC in Faulty Nonce Model
    Dutta, Avijit
    Nandi, Mridul
    Talnikar, Suprita
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 : 437 - 466
  • [3] One-Key Compression Function Based MAC with Security Beyond Birthday Bound
    Dutta, Avijit
    Nandi, Mridul
    Paul, Goutam
    INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 : 343 - 358
  • [4] Permutation-Based Hashing Beyond the Birthday Bound
    Lefevre, Charlotte
    Mennink, Bart
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 71 - 113
  • [5] 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
    Zhang, Liting
    Wu, Wenling
    Sui, Han
    Wang, Peng
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 296 - 312
  • [6] Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
    Minematsu, Kazuhiko
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 308 - 326
  • [7] Blockcipher-Based MACs: Beyond the Birthday Bound Without Message Length
    Naito, Yusuke
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 446 - 470
  • [8] Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
    Datta, Nilanjan
    Dutta, Avijit
    Nandi, Mridul
    Yasuda, Kan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 631 - 661