Generic Related-Key Attacks for HMAC

被引:0
|
作者
Peyrin, Thomas [1 ]
Sasaki, Yu [2 ]
Wang, Lei [1 ,3 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[2] NTT Corp, NTT Secure Platform Labs, Tokyo, Tokyo, Japan
[3] Univ Electrocommun, Chofu, Tokyo, Japan
来源
基金
新加坡国家研究基金会;
关键词
HMAC; hash function; distinguisher; forgery; related-key; RECOVERY ATTACKS; HASH FUNCTIONS; SECURITY; NMAC; HMAC/NMAC-MD4; HAVAL; PRFS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single relatedkey) for the HMAC construction. When HMAC uses a k-bit key, outputs an n-bit MAC, and is instantiated with an l-bit inner iterative hash function processing m-bit message blocks where m = k, our distinguishing-R attack requires about 2(n/2) queries which improves over the currently best known generic attack complexity 2(l/2) as soon as l > n. This means that contrary to the general belief, using wide-pipe hash functions as internal primitive will not increase the overall security of HMAC in the related-key model when the key size is equal to the message block size. We also present generic related-key distinguishing-H, internal state recovery and forgery attacks. Our method is new and elegant, and uses a simple cyclesize detection criterion. The issue in the HMAC construction (not present in the NMAC construction) comes from the non-independence of the two inner hash layers and we provide a simple patch in order to avoid this generic attack. Our work finally shows that the choice of the opad and ipad constants value in HMAC is important.
引用
收藏
页码:580 / 597
页数:18
相关论文
共 50 条
  • [31] Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
    Bellare, Mihir
    Cash, David
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 666 - 684
  • [32] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
    Boehl, Florian
    Davies, Gareth T.
    Hofheinz, Dennis
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
  • [33] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 27 - 34
  • [34] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
  • [35] From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour
    Karpman, Pierre
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 177 - 188
  • [36] AES Variants Secure against Related-Key Differential and Boomerang Attacks
    Choy, Jiali
    Zhang, Aileen
    Khoo, Khoongming
    Henricksen, Matt
    Poschmann, Axel
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 191 - 207
  • [37] The resistance of PRESENT-80 against related-key differential attacks
    Sareh Emami
    San Ling
    Ivica Nikolić
    Josef Pieprzyk
    Huaxiong Wang
    Cryptography and Communications, 2014, 6 : 171 - 187
  • [38] The resistance of PRESENT-80 against related-key differential attacks
    Emami, Sareh
    Ling, San
    Nikolic, Ivica
    Pieprzyk, Josef
    Wang, Huaxiong
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (03): : 171 - 187
  • [39] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 3 - 18
  • [40] Proof of retrievability with public verifiability resilient against related-key attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    IET INFORMATION SECURITY, 2015, 9 (01) : 43 - 49