2014
DOI: 10.1007/s00145-014-9178-9
|View full text |Cite
|
Sign up to set email alerts
|

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

Abstract: Abstract. Universal hash functions are commonly used primitives for fast and secure message authentication in the form of Message Authentication Codes (MACs) or Authenticated Encryption with Associated Data (AEAD) schemes. These schemes are widely used and standardised, the most well known being McGrew and Viega's Galois/Counter Mode (GCM). In this paper we identify some properties of hash functions based on polynomial evaluation that arise from the underlying algebraic structure. As a result we are able to de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…Note that there are papers attacking polynomial-based Wegman-Carter authenticators [28,48], where the attacks focus on finding weak keys. However, as shown by the analysis of Procter and Cid [43,44], almost every subset of the keyspace can be considered a weak key class. Hence our results do not contradict prior work.…”
Section: Multi-gcm Securitymentioning
confidence: 99%
“…Note that there are papers attacking polynomial-based Wegman-Carter authenticators [28,48], where the attacks focus on finding weak keys. However, as shown by the analysis of Procter and Cid [43,44], almost every subset of the keyspace can be considered a weak key class. Hence our results do not contradict prior work.…”
Section: Multi-gcm Securitymentioning
confidence: 99%