The security of the cipher block chaining message authentication code

被引:259
|
作者
Bellare, M
Kilian, J
Rogaway, P
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] NEC Res Inst, Princeton, NJ 08540 USA
[3] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
基金
美国国家科学基金会;
关键词
D O I
10.1006/jcss.1999.1694
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Let F be some block cipher (eg, DES) with block length l. The cipher block chaining message authentication code (CBC MAC) specifies that an m-block message x-x(1) ...x(m) be authenticated among parties who share a secret kev a for the block cipher by tagging x with a prefix of y(m), where y(o) = 0' and y(i) = F-a(m(i) + y(i-l)) for i = l, 2, ..., m. This method is a pervasively used international and U.S. standard. We provide its first formal justification, showing the following general lemma: cipher block chaining a pseudorandom function yields a pseudorandom function. Underlying our results is a technical lemma of independent interest, bounding the success probability of a computationally unbounded adversary in distinguishing between a random ml-bit to l-bit function and the CBC MAC of a random l-bit to l-bit function. (C) 2000 Academic Press.
引用
收藏
页码:362 / 399
页数:38
相关论文
共 50 条
  • [1] Throughput optimization of the cipher message authentication code
    Michail, H. E.
    Kakarountas, A. P.
    Selimis, G.
    Goutis, C. E.
    [J]. PROCEEDINGS OF THE 2007 15TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, 2007, : 495 - +
  • [2] Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher
    Naito, Yusuke
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 167 - 182
  • [3] Fault Attacks on Cipher Block Chaining-Message Authentication Code and Its Variants Based on AES-128 Suitable for Wireless Sensor Networks
    Jeong, Kitae
    Sung, Jaechul
    Hong, Seokhie
    Chang, Ku-Young
    [J]. SENSOR LETTERS, 2013, 11 (09) : 1755 - 1764
  • [4] Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement
    Kumar, Gulshan
    Rai, Mritunjay
    Lee, Gang-soo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (01): : 57 - 72
  • [5] A block-cipher mode of operation for parallelizable message authentication
    Black, J
    Rogaway, P
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 384 - 397
  • [6] On efficient message authentication via block cipher design techniques
    Jakimoski, G.
    Subbalakshmi, K. P.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 232 - 248
  • [7] A new message authentication technique using zigzag manipulation and block chaining
    Abbadi, Mohammad
    [J]. Journal of Applied Sciences, 2008, 8 (21) : 3863 - 3870
  • [8] Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms
    Adekunle, A. A.
    Woodhead, S. R.
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 216 - 221
  • [9] Enhancing Biometric Fingerprint Security Through Integrated Watermarking and Cipher Block Chaining Techniques
    Ghaz, Abdelkrim
    Nouioua, Nadhir
    Seddiki, Ali
    [J]. TRAITEMENT DU SIGNAL, 2023, 40 (03) : 981 - 993
  • [10] ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
    Iwata, Tetsu
    Minematsu, Kazuhiko
    Peyrin, Thomas
    Seurin, Yannick
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 34 - 65