On the security of iterated message authentication codes

被引:55
|
作者
Preneel, B [1 ]
van Oorschot, PC
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT, B-3001 Heverlee, Belgium
[2] Entrust Technol, Ottawa, ON K1V 1A7, Canada
关键词
collisions; cryptanalysis; data authentication; hash functions; message authentication codes;
D O I
10.1109/18.746787
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of iterated message authentication code (MAC) algorithms is considered, and in particular, these constructed from unkeyed hash functions. A new MAC forgery attack applicable to all deterministic iterated MAC algorithms is presented, which requires on the order of 2(n/2) known text-MAC pairs for algorithms with n bits of internal memory, as compared to the best previous general attack which required exhaustive key search. A related key-recovery attack is also given which applies to a large class of MAC algorithms including a strengthened version of CBC-MAC found in ANSI X9.19 and ISO/IEC 9797, and envelope MAC techniques such as "keyed MD5." The security of several related existing MAC's based directly on unkeyed hash functions, including the secret prefix and secret suffix methods, is also examined.
引用
收藏
页码:188 / 199
页数:12
相关论文
共 50 条
  • [41] Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security
    Hussain, S. M. Suhail
    Farooq, Shaik Mullapathi
    Ustun, Taha Selim
    [J]. IEEE ACCESS, 2019, 7 : 80980 - 80984
  • [42] Sequential Aggregate Authentication Codes with Information Theoretic Security
    Tomita, Shinichiro
    Watanabe, Yohei
    Shikata, Junji
    [J]. 2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [43] Multi-message Authentication over Noisy Channel with Polar Codes
    Chen, Dajiang
    Cheng, Nan
    Zhang, Ning
    Zhang, Kuan
    Qin, Zhiguang
    Shen, Xuemin
    [J]. 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2017, : 46 - 54
  • [44] TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks
    Zheng Gong
    Pieter Hartel
    Svetla Nikova
    Shao-Hua Tang
    Bo Zhu
    [J]. Journal of Computer Science and Technology, 2014, 29 : 53 - 68
  • [45] Paillier Cryptography Based Message Authentication Code for IoMT Security
    Siamala Devi, S.
    Kuruba, Chandrakala
    Nam, Yunyoung
    Abouhawwash, Mohamed
    [J]. Computer Systems Science and Engineering, 2023, 44 (03): : 2209 - 2223
  • [46] Cumulative Message Authentication Codes for Resource-Constrained IoT Networks
    Li, He
    Kumar, Vireshwar
    Park, Jung-Min
    Yang, Yaling
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15): : 11847 - 11859
  • [47] Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
    Capkun, Srdjan
    Cagalj, Mario
    Rengaswamy, Ramkumar
    Tsigkogiannis, Ilias
    Hubaux, Jean-Pierre
    Srivastava, Mani
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 208 - 223
  • [48] Considering Security For ZigBee Protocol Using Message Authentication Code
    Kulkarni, Suhas
    Ghosh, Uttam
    Pasupuleti, Haribabu
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [49] TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks
    龚征
    Pieter Hartel
    Svetla Nikova
    唐韶华
    朱博
    [J]. Journal of Computer Science & Technology, 2014, 29 (01) : 53 - 68
  • [50] TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks
    Gong, Zheng
    Hartel, Pieter
    Nikova, Svetla
    Tang, Shao-Hua
    Zhu, Bo
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 53 - 68