A MAC forgery attack on SOBER-128

6Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

SOBER-128 is a stream cipher designed by Rose and Hawkes in 2003. It can be also uses for generating Message Authentication Codes (MACs). The developers claimed that it is difficult to forge the MAC generated by SOBER-128, though, the security model defined in the proposal paper is not realistic. In this paper, we examine the security of the MAC generation function of SOBER-128 under the security notion given by Bellare and Namprempre. As a result, we show the MAC generation function of SOBER-128 is vulnerable against differential cryptanalysis. The success probability of this attack is estimated at 2-6. © International Association for Cryptologic Research 2004.

Cite

CITATION STYLE

APA

Watanabe, D., & Furuya, S. (2004). A MAC forgery attack on SOBER-128. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3017, 472–482. https://doi.org/10.1007/978-3-540-25937-4_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free