Key recovery and forgery attacks on the MacDES MAC algorithm

被引:0
|
作者
Coppersmith, D [1 ]
Knudsen, LR
Mitchell, CJ
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Res, Yorktown Hts, NY 10598 USA
[2] Univ Bergen, Dept Informat, N-5020 Bergen, Norway
[3] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Message Authentication Codes; cryptanalysis; CBC-MAC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, these techniques will work when the MAC calculation involves prefixing the data to be MACed with a 'length block'. These attack methods provide new (tighter) upper bounds on the level of security offered by the MacDES technique.
引用
收藏
页码:184 / 196
页数:13
相关论文
共 50 条
  • [1] Attacks on MacDES MAC algorithm
    Coppersmith, D
    Mitchell, CJ
    [J]. ELECTRONICS LETTERS, 1999, 35 (19) : 1626 - 1627
  • [2] Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
    Bay, Asli
    Ersoy, Oguzhan
    Karakoc, Ferhat
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 354 - 368
  • [3] MacDES: MAC algorithm based on DES
    Knudsen, LR
    Preneel, B
    [J]. ELECTRONICS LETTERS, 1998, 34 (09) : 871 - 873
  • [4] Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant
    Lee, Changhoon
    Kim, Jongsung
    Sung, Jaechul
    Hong, Seokhie
    Lee, Sangjin
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 421 - 431
  • [5] New CBC-MAC forgery attacks
    Brincat, K
    Mitchell, CJ
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 3 - 14
  • [6] Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    Contini, Scott
    Yin, Yiqun Lisa
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 37 - +
  • [7] Key-recovery attacks on universal hash function based MAC algorithms
    Handschuh, Helena
    Preneel, Bart
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 144 - +
  • [8] Collision Attacks Against CAESAR Candidates Forgery and Key-Recovery Against AEZ and Marble
    Fuhr, Thomas
    Leurent, Gaetan
    Suder, Valentin
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 510 - 532
  • [9] Almost universal forgery attacks on AES-based MAC's
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 76 (03) : 431 - 449
  • [10] Almost universal forgery attacks on AES-based MAC’s
    Orr Dunkelman
    Nathan Keller
    Adi Shamir
    [J]. Designs, Codes and Cryptography, 2015, 76 : 431 - 449