Generic Related-Key Attacks for HMAC

被引:0
|
作者
Peyrin, Thomas [1 ]
Sasaki, Yu [2 ]
Wang, Lei [1 ,3 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[2] NTT Corp, NTT Secure Platform Labs, Tokyo, Tokyo, Japan
[3] Univ Electrocommun, Chofu, Tokyo, Japan
来源
基金
新加坡国家研究基金会;
关键词
HMAC; hash function; distinguisher; forgery; related-key; RECOVERY ATTACKS; HASH FUNCTIONS; SECURITY; NMAC; HMAC/NMAC-MD4; HAVAL; PRFS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single relatedkey) for the HMAC construction. When HMAC uses a k-bit key, outputs an n-bit MAC, and is instantiated with an l-bit inner iterative hash function processing m-bit message blocks where m = k, our distinguishing-R attack requires about 2(n/2) queries which improves over the currently best known generic attack complexity 2(l/2) as soon as l > n. This means that contrary to the general belief, using wide-pipe hash functions as internal primitive will not increase the overall security of HMAC in the related-key model when the key size is equal to the message block size. We also present generic related-key distinguishing-H, internal state recovery and forgery attacks. Our method is new and elegant, and uses a simple cyclesize detection criterion. The issue in the HMAC construction (not present in the NMAC construction) comes from the non-independence of the two inner hash layers and we provide a simple patch in order to avoid this generic attack. Our work finally shows that the choice of the opad and ipad constants value in HMAC is important.
引用
收藏
页码:580 / 597
页数:18
相关论文
共 50 条
  • [41] Related-key differential attacks on Cobra-H64/128
    Guo, J.-S. (guojs_crypt@126.com), 1600, Chinese Institute of Electronics (41):
  • [42] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Hu, Chengyu
    Liu, Pengtao
    Guo, Shanqing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 681 - 692
  • [43] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Chengyu Hu
    Pengtao Liu
    Shanqing Guo
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
  • [44] NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS
    Hussien, Hassan Mansur
    Muda, Zaiton
    Yasin, Sharifah Md
    JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA, 2018, 17 (03): : 409 - 434
  • [45] On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
    Albrecht, M. R.
    Farshim, P.
    Paterson, K. G.
    Watson, G. J.
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 128 - 145
  • [46] Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 17 - 33
  • [47] On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks
    Morita, Hiraku
    Schuldt, Jacob C. N.
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 73 - 90
  • [48] Related-key differential-linear attacks on reduced AES-192
    Zhang, Wentao
    Zhang, Lei
    Wu, Wenling
    Feng, Dengguo
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 73 - +
  • [49] Related-key attacks on the Py-family of ciphers and an approach to repair the weaknesses
    Sekar, Gautham
    Paul, Souradyuti
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 58 - 72
  • [50] Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
    Yi, Zhang
    Kai, Zhang
    Ting, Cui
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 672 - 682