New Birthday Attacks on Some MACS Based on Block Ciphers

被引:0
|
作者
Yuan, Zheng [1 ,2 ]
Tang, Wei [3 ]
Jia, Keting [3 ]
Xu, Guangwu [4 ]
Wang, Xiaoyun [1 ,3 ]
机构
[1] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
[3] Shandong Univ, Minist Educ, Key Lab Cryptolog Technol & Informat Secur, Jinan 250100, Peoples R China
[4] Univ Wisconsin, Dept Elect Engn & Comp Sci, Milwaukee, WI 53706 USA
来源
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
MAC; Birthday attack; Distinguishing attack; Forgery attack; Impossible differential cryptanalysis; AES; ALPHA-MAC; CBC MAC; CRYPTANALYSIS; AES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper develops several new techniques of cryptanalyzing MACs based on block ciphers, and is divided into two parts. The first part presents new distinguishers of the MAC construction ALRED and its specific instance ALPHA-MAC based on AES. For the ALRED construction, we first; describe a general distinguishing attack which leads to a forgery attack directly with the complexity of the birthday attack. A 2-round collision differential path of ALPHA-MAC is adopted to construct a new distinguisher with about 2(65.5) chosen messages and 2(65.5) queries. One of the most important results is to use this new distinguisher to recover the internal state, which is an equivalent sub-key of ALPHA-MAC. Moreover, our distinguisher on ALRED construction can be applied to the MACS based on CBC and CFB encryption modes. The second part describes the first impossible differential attack on MACs-PELICAN, MT-MAC-AES and PC-MAC-AES. Using the birthday attack, enough message pairs that produce the inner near-collision with some specific differences are detected, then the impossible differential attack on 4-round AES to the above mentioned MACS is performed. For PELICAN, our attack recovers its internal state, which is an equivalent subkey. For MT-MAC-AES, the attack turns out to be a subkey recovery attack directly. The complexity of the two attacks is 2(85.5) chosen messages and 2(85.5) queries. For PC-MAC-AES, we recover its 256-bit key with 2(85.5) chosen messages and 2(128) queries.
引用
收藏
页码:209 / +
页数:3
相关论文
共 50 条
  • [31] Attacks of simple block ciphers via efficient heuristics
    Nalini, N.
    Rao, G. Raghavendra
    INFORMATION SCIENCES, 2007, 177 (12) : 2553 - 2569
  • [32] Algebraic Attacks on Block Ciphers Using Quantum Annealing
    Burek, Elzbieta
    Wronski, Micha
    Mank, Krzysztof
    Misztal, Micha
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 678 - 689
  • [33] Systematic Construction of Nonlinear Product Attacks on Block Ciphers
    Courtois, Nicolas T.
    Abbondati, Matteo
    Ratoanina, Hamy
    Grajek, Marek
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 20 - 51
  • [34] Stream/block ciphers, difference equations and algebraic attacks
    La Scala, Roberto
    Tiwari, Sharwan K.
    JOURNAL OF SYMBOLIC COMPUTATION, 2022, 109 : 177 - 198
  • [35] How to Thwart Birthday Attacks against MACs via Small Randomness
    Minematsu, Kazuhiko
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 230 - 249
  • [36] Some Words on Linearisation Attacks on FCSR-based Stream Ciphers
    Ali, Arshad
    PROCEEDINGS OF 2014 11TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES & TECHNOLOGY (IBCAST), 2014, : 195 - 202
  • [37] Impossible differential attacks on the SKINNY family of block ciphers
    Yang, Dong
    Qi, Wen-Feng
    Chen, Hua-Jin
    IET INFORMATION SECURITY, 2017, 11 (06) : 377 - 385
  • [38] Cryptanalysis of some hash functions based on block ciphers and codes
    Wu, Hongjun
    Bao, Feng
    Deng, Robert H.
    Informatica (Ljubljana), 2002, 26 (03) : 255 - 258
  • [39] On some block ciphers and imprimitive groups
    A. Caranti
    F. Dalla Volta
    M. Sala
    Applicable Algebra in Engineering, Communication and Computing, 2009, 20 : 339 - 350
  • [40] On some block ciphers and imprimitive groups
    Caranti, A.
    Volta, F. Dalla
    Sala, M.
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2009, 20 (5-6) : 339 - 350