Generic Related-Key Attacks for HMAC

被引:0
|
作者
Peyrin, Thomas [1 ]
Sasaki, Yu [2 ]
Wang, Lei [1 ,3 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[2] NTT Corp, NTT Secure Platform Labs, Tokyo, Tokyo, Japan
[3] Univ Electrocommun, Chofu, Tokyo, Japan
来源
基金
新加坡国家研究基金会;
关键词
HMAC; hash function; distinguisher; forgery; related-key; RECOVERY ATTACKS; HASH FUNCTIONS; SECURITY; NMAC; HMAC/NMAC-MD4; HAVAL; PRFS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single relatedkey) for the HMAC construction. When HMAC uses a k-bit key, outputs an n-bit MAC, and is instantiated with an l-bit inner iterative hash function processing m-bit message blocks where m = k, our distinguishing-R attack requires about 2(n/2) queries which improves over the currently best known generic attack complexity 2(l/2) as soon as l > n. This means that contrary to the general belief, using wide-pipe hash functions as internal primitive will not increase the overall security of HMAC in the related-key model when the key size is equal to the message block size. We also present generic related-key distinguishing-H, internal state recovery and forgery attacks. Our method is new and elegant, and uses a simple cyclesize detection criterion. The issue in the HMAC construction (not present in the NMAC construction) comes from the non-independence of the two inner hash layers and we provide a simple patch in order to avoid this generic attack. Our work finally shows that the choice of the opad and ipad constants value in HMAC is important.
引用
收藏
页码:580 / 597
页数:18
相关论文
共 50 条
  • [21] Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
    Kim, Jongsung
    Hong, Seokhie
    Preneel, Bart
    Biham, Eli
    Dunkelman, Orr
    Keller, Nathan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) : 4948 - 4966
  • [22] Related-Key Attacks Against Full Hummingbird-2
    Saarinen, Markku-Juhani O.
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 467 - 482
  • [23] Related-Key Differential Attacks on Reduced-Round LBlock
    Weng, Tianling
    Cui, Tingting
    Yang, Ting
    Guo, Yinghua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [24] Related-key attacks on reduced rounds of SHACAL-2
    Kim, J
    Kim, G
    Lee, S
    Lim, J
    Song, J
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 175 - 190
  • [25] Improved Constructions of PRFs Secure Against Related-Key Attacks
    Lewi, Kevin
    Montgomery, Hart
    Raghunathan, Ananth
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 44 - 61
  • [26] On Related-Key Attacks and KASUMI: The Case of A5/3
    Phuong Ha Nguyen
    Robshaw, Matthew J. B.
    Wang, Huaxiong
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 146 - +
  • [27] On related-key and collision attacks: The case for the IBM 4758 cryptoprocessor
    Phan, RCW
    Handschuh, H
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 111 - 122
  • [28] Revisiting AES related-key differential attacks with constraint programming
    Gerault, David
    Lafourcade, Pascal
    Minier, Marine
    Solnon, Christine
    INFORMATION PROCESSING LETTERS, 2018, 139 : 24 - 29
  • [29] On the Security of Non-Interactive Key Exchange against Related-Key Attacks
    Morita, Hiraku
    Schuldt, Jacob C. N.
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1910 - 1923
  • [30] Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48
    Lin, Yunxue
    Sun, Ling
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 355 - 377