MESSAGE AUTHENTICATION CODES AND DIFFERENTIAL ATTACK

被引:0
|
作者
OHTA, K
MATSUI, M
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We discuss the security of Message Authentication Code (MAC) schemes from the viewpoint of differential attack, and propose an attack that is effective against DES-MAC and FEAL-MAC. The attack derives the secret authentication key in the chosen plaintext scenario. For example, DES(8-round) MAC can be broken with 2(34) pairs of plaintext, while FEAL8-MAC can be broken with 2(22) pairs. The proposed attack is applicable to any MAC scheme, even if the 32-bits are randomly selected from among the 64-bits of ciphertext generated by a cryptosystem vulnerable to differential attack in the chosen plaintext scenario.
引用
收藏
页码:8 / 14
页数:7
相关论文
共 50 条
  • [1] RAD: Reflector Attack Defense Using Message Authentication Codes
    Kline, Erik
    Beaumont-Gay, Matt
    Mirkovic, Jelena
    Reiher, Peter
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 269 - +
  • [2] Distinguishing Attack and Second-Preimage Attack on Encrypted Message Authentication Codes (EMAC)
    Ariwibowo, Sigit
    Windarta, Susila
    [J]. PROCEEDINGS OF THE 7TH SEAMS UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2015: ENHANCING THE ROLE OF MATHEMATICS IN INTERDISCIPLINARY RESEARCH, 2016, 1707
  • [3] Aggregate message authentication codes
    Katz, Jonathan
    Lindell, Andrew Y.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 155 - +
  • [4] Cryptanalysis of message authentication codes
    Preneel, B
    [J]. INFORMATION SECURITY, 1998, 1396 : 55 - 65
  • [5] Functional Message Authentication Codes With Message and Function Privacy
    Li, Pu
    Liu, Muhua
    Shang, Youlin
    [J]. IET Information Security, 2024, 2024 (01)
  • [6] A study of blind message authentication codes
    Namprempre, Chanathip
    Neven, Gregory
    Abdalla, Michel
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 75 - 82
  • [7] Approximate image message authentication codes
    Xie, LH
    Arce, GR
    Graveman, RF
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2001, 3 (02) : 242 - 252
  • [8] On the security of iterated message authentication codes
    Preneel, B
    van Oorschot, PC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (01) : 188 - 199
  • [9] Structurally aggregate message authentication codes
    Ishii, Yuta
    Tada, Mitsuru
    [J]. PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 339 - 343
  • [10] On the (Im)possibility of blind message authentication codes
    Abdalla, M
    Namprempre, C
    Neven, G
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 262 - 279