2013
DOI: 10.1007/978-3-642-42045-0_1
|View full text |Cite
|
Sign up to set email alerts
|

New Generic Attacks against Hash-Based MACs

Abstract: Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven to be secure under reasonable assumptions on the hash function. On the other hand, if an n-bit MAC is built from a hash function with a l-bit state (l ≥ n), there is a well-known existential forgery attack with complexity 2 l/2 . However, the remaining security after 2 l/2 computations is not well understood. In particular it is widely a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
78
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 28 publications
(81 citation statements)
references
References 31 publications
3
78
0
Order By: Relevance
“…Our universal forgery attack is based on recent advances in hash-based MACs cryptanalysis [17,15] and in this section we quickly recall these methods and explain how we extend them. First of all, we need to introduce the notion of functional graph and the various properties that can be observed from it.…”
Section: Previous Functional-graph-based Attacks For Hmacmentioning
confidence: 99%
See 2 more Smart Citations
“…Our universal forgery attack is based on recent advances in hash-based MACs cryptanalysis [17,15] and in this section we quickly recall these methods and explain how we extend them. First of all, we need to introduce the notion of functional graph and the various properties that can be observed from it.…”
Section: Previous Functional-graph-based Attacks For Hmacmentioning
confidence: 99%
“…Later, Leurent et al [15] extended the scope of cycle detection by providing a single-key utilization of this technique. Namely, they show how to craft two special long messages (mainly composed of identical message blocks), both following two separate cycle loops in the functional graph of the internal compression function.…”
Section: Previous Functional-graph-based Attacks For Hmacmentioning
confidence: 99%
See 1 more Smart Citation
“…First, from the security viewpoint, the justification comes from the rich line of research on generic attacks on hash-based MACs. Most recent attacks [20,16,21,11] exploit the so-called "functional graph" of the compression function f, i.e., the graph capturing the structure of f when repeatedly invoked with its b-bit input fixed to some constant (say 0 b ). Since our whitening denies the adversary the knowledge of b-bit inputs on which f is invoked during construction queries, intuitively it seems to be the right way to foil such attacks.…”
Section: Introductionmentioning
confidence: 99%
“…As mentioned above, the motivation for our work partially stems from the recent line of work on generic attacks against iterated hash-based MACs [20,18,16,21,11,6,23]. While our security bound for WNMAC does not exclude attacks of the complexity (in terms of numbers of queries and message lengths) considered in these papers, the design of WNMAC was partially guided by the structure of these attacks and seems to prevent them.…”
Section: Introductionmentioning
confidence: 99%