On the security of iterated message authentication codes

被引:55
|
作者
Preneel, B [1 ]
van Oorschot, PC
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT, B-3001 Heverlee, Belgium
[2] Entrust Technol, Ottawa, ON K1V 1A7, Canada
关键词
collisions; cryptanalysis; data authentication; hash functions; message authentication codes;
D O I
10.1109/18.746787
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of iterated message authentication code (MAC) algorithms is considered, and in particular, these constructed from unkeyed hash functions. A new MAC forgery attack applicable to all deterministic iterated MAC algorithms is presented, which requires on the order of 2(n/2) known text-MAC pairs for algorithms with n bits of internal memory, as compared to the best previous general attack which required exhaustive key search. A related key-recovery attack is also given which applies to a large class of MAC algorithms including a strengthened version of CBC-MAC found in ANSI X9.19 and ISO/IEC 9797, and envelope MAC techniques such as "keyed MD5." The security of several related existing MAC's based directly on unkeyed hash functions, including the secret prefix and secret suffix methods, is also examined.
引用
收藏
页码:188 / 199
页数:12
相关论文
共 50 条
  • [1] Security of message authentication codes in the presence of key-dependent messages
    Madeline González Muñiz
    Rainer Steinwandt
    [J]. Designs, Codes and Cryptography, 2012, 64 : 161 - 169
  • [2] Security of message authentication codes in the presence of key-dependent messages
    Muniz, Madeline Gonzalez
    Steinwandt, Rainer
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 161 - 169
  • [3] Aggregate message authentication codes
    Katz, Jonathan
    Lindell, Andrew Y.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 155 - +
  • [4] Cryptanalysis of message authentication codes
    Preneel, B
    [J]. INFORMATION SECURITY, 1998, 1396 : 55 - 65
  • [5] Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
    Fraunhofer Fkie, Rwth Aachen University, Wachtberg, Germany
    不详
    [J]. WiSec - Proc. ACM Conf. Secur, Priv. in Wirel. Mob. Networks, 2022, (207-221):
  • [6] Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
    Wagner, Eric
    Bauer, Jan
    Henze, Martin
    [J]. PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 207 - 221
  • [7] Functional Message Authentication Codes With Message and Function Privacy
    Li, Pu
    Liu, Muhua
    Shang, Youlin
    [J]. IET Information Security, 2024, 2024 (01)
  • [8] A study of blind message authentication codes
    Namprempre, Chanathip
    Neven, Gregory
    Abdalla, Michel
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 75 - 82
  • [9] Approximate image message authentication codes
    Xie, LH
    Arce, GR
    Graveman, RF
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2001, 3 (02) : 242 - 252
  • [10] MESSAGE AUTHENTICATION CODES AND DIFFERENTIAL ATTACK
    OHTA, K
    MATSUI, M
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (01) : 8 - 14