New Birthday Attacks on Some MACS Based on Block Ciphers

被引:0
|
作者
Yuan, Zheng [1 ,2 ]
Tang, Wei [3 ]
Jia, Keting [3 ]
Xu, Guangwu [4 ]
Wang, Xiaoyun [1 ,3 ]
机构
[1] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
[3] Shandong Univ, Minist Educ, Key Lab Cryptolog Technol & Informat Secur, Jinan 250100, Peoples R China
[4] Univ Wisconsin, Dept Elect Engn & Comp Sci, Milwaukee, WI 53706 USA
来源
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
MAC; Birthday attack; Distinguishing attack; Forgery attack; Impossible differential cryptanalysis; AES; ALPHA-MAC; CBC MAC; CRYPTANALYSIS; AES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper develops several new techniques of cryptanalyzing MACs based on block ciphers, and is divided into two parts. The first part presents new distinguishers of the MAC construction ALRED and its specific instance ALPHA-MAC based on AES. For the ALRED construction, we first; describe a general distinguishing attack which leads to a forgery attack directly with the complexity of the birthday attack. A 2-round collision differential path of ALPHA-MAC is adopted to construct a new distinguisher with about 2(65.5) chosen messages and 2(65.5) queries. One of the most important results is to use this new distinguisher to recover the internal state, which is an equivalent sub-key of ALPHA-MAC. Moreover, our distinguisher on ALRED construction can be applied to the MACS based on CBC and CFB encryption modes. The second part describes the first impossible differential attack on MACs-PELICAN, MT-MAC-AES and PC-MAC-AES. Using the birthday attack, enough message pairs that produce the inner near-collision with some specific differences are detected, then the impossible differential attack on 4-round AES to the above mentioned MACS is performed. For PELICAN, our attack recovers its internal state, which is an equivalent subkey. For MT-MAC-AES, the attack turns out to be a subkey recovery attack directly. The complexity of the two attacks is 2(85.5) chosen messages and 2(85.5) queries. For PC-MAC-AES, we recover its 256-bit key with 2(85.5) chosen messages and 2(128) queries.
引用
收藏
页码:209 / +
页数:3
相关论文
共 50 条
  • [21] Counting equations in algebraic attacks on block ciphers
    Lars R. Knudsen
    Charlotte V. Miolane
    International Journal of Information Security, 2010, 9 : 127 - 135
  • [22] Attacks on Block Ciphers of Low Algebraic Degree
    Thomas Jakobsen
    Lars R. Knudsen
    Journal of Cryptology, 2001, 14 : 197 - 210
  • [23] Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting
    Guo, Tingting
    Wang, Peng
    Hu, Lei
    Ye, Dingfeng
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 421 - 441
  • [24] New Generic Attacks against Hash-Based MACs
    Leurent, Gaetan
    Peyrin, Thomas
    Wang, Lei
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 1 - 20
  • [25] Side Channel Attacks Cryptanalysis against Block Ciphers Based on FPGA Devices
    Bechtsoudis, Anestis
    Sklavos, Nicolas
    IEEE ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2010), 2010, : 460 - 461
  • [26] Building Secure Block Ciphers on Generic Attacks Assumptions
    Patarin, Jacques
    Seurin, Yannick
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 66 - 81
  • [27] New attacks against standardized MACs
    Joux, A
    Poupard, G
    Stern, J
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 170 - 181
  • [28] DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS
    Denisov, O., V
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (48): : 43 - 62
  • [29] Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs
    Shen, Yaobin
    Standaert, Francois-Xavier
    Wang, Lei
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT III, 2023, 14440 : 169 - 189
  • [30] Further Analysis of Block Ciphers against Timing Attacks
    LI Wei~ 1
    2. State Key Laboratory of Modern Communications
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1629 - 1632