New Birthday Attacks on Some MACS Based on Block Ciphers

被引:0
|
作者
Yuan, Zheng [1 ,2 ]
Tang, Wei [3 ]
Jia, Keting [3 ]
Xu, Guangwu [4 ]
Wang, Xiaoyun [1 ,3 ]
机构
[1] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[2] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
[3] Shandong Univ, Minist Educ, Key Lab Cryptolog Technol & Informat Secur, Jinan 250100, Peoples R China
[4] Univ Wisconsin, Dept Elect Engn & Comp Sci, Milwaukee, WI 53706 USA
来源
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
MAC; Birthday attack; Distinguishing attack; Forgery attack; Impossible differential cryptanalysis; AES; ALPHA-MAC; CBC MAC; CRYPTANALYSIS; AES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper develops several new techniques of cryptanalyzing MACs based on block ciphers, and is divided into two parts. The first part presents new distinguishers of the MAC construction ALRED and its specific instance ALPHA-MAC based on AES. For the ALRED construction, we first; describe a general distinguishing attack which leads to a forgery attack directly with the complexity of the birthday attack. A 2-round collision differential path of ALPHA-MAC is adopted to construct a new distinguisher with about 2(65.5) chosen messages and 2(65.5) queries. One of the most important results is to use this new distinguisher to recover the internal state, which is an equivalent sub-key of ALPHA-MAC. Moreover, our distinguisher on ALRED construction can be applied to the MACS based on CBC and CFB encryption modes. The second part describes the first impossible differential attack on MACs-PELICAN, MT-MAC-AES and PC-MAC-AES. Using the birthday attack, enough message pairs that produce the inner near-collision with some specific differences are detected, then the impossible differential attack on 4-round AES to the above mentioned MACS is performed. For PELICAN, our attack recovers its internal state, which is an equivalent subkey. For MT-MAC-AES, the attack turns out to be a subkey recovery attack directly. The complexity of the two attacks is 2(85.5) chosen messages and 2(85.5) queries. For PC-MAC-AES, we recover its 256-bit key with 2(85.5) chosen messages and 2(128) queries.
引用
收藏
页码:209 / +
页数:3
相关论文
共 50 条
  • [41] New correlation attacks on stream ciphers
    Penzhorn, WT
    Bruwer, C
    2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 203 - 208
  • [42] Detecting block ciphers generic attacks: An instance-based machine learning method
    Alsariera, Yazan Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (05): : 60 - 68
  • [43] Output Prediction Attacks on Block Ciphers Using Deep Learning
    Kimura, Hayato
    Emura, Keita
    Isobe, Takanori
    Ito, Ryoma
    Ogawa, Kazuto
    Ohigashi, Toshihiro
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 248 - 276
  • [44] Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
    Saha, Sayandeep
    Bag, Arnab
    Roy, Debapriya Basu
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 612 - 643
  • [45] Designing against a class of algebraic attacks on symmetric block ciphers
    Adams, C
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (01) : 17 - 27
  • [46] Self-similarity attacks on block ciphers and application to KeeLoq
    Courtois, Nicolas T.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 6805 LNCS : 55 - 66
  • [47] Designing against a class of algebraic attacks on symmetric block ciphers
    Carlisle Adams
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 17 - 27
  • [48] Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
    He, Yu
    Wang, Gaoli
    Li, Wenshan
    Ren, Yizhi
    IEEE ACCESS, 2020, 8 : 20920 - 20930
  • [49] A note on an infeasible linearization of some block ciphers
    Aragona, Riccardo
    Rimoldi, Anna
    Sala, Massimiliano
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 209 - 218
  • [50] A NOTE ON SOME ALGEBRAIC TRAPDOORS FOR BLOCK CIPHERS
    Calderini, Marco
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2018, 12 (03) : 515 - 524