Cryptanalysis of PMACx, PMAC2x, and SIVx

  • Minematsu K
  • Iwata T
N/ACitations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx. These schemes use a tweakable block cipher (TBC) as the underlying primitive, and are provably secure up to the query complexity of 2n, where n denotes the block length of the TBC. In this paper, we falsify the provable security claims by presenting concrete attacks. We show that with the query complexity of O(2n/2), i.e., with the birthday complexity, PMACx, PMAC2x, and SIVx are all insecure.

Cite

CITATION STYLE

APA

Minematsu, K., & Iwata, T. (2017). Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Transactions on Symmetric Cryptology, 162–176. https://doi.org/10.46586/tosc.v2017.i2.162-176

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free