Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds

2Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

A main contribution of this paper is an improved analysis against HMAC instantiating with reduced Whirlpool. It recovers equivalent keys, which are often denoted as K in and K out, of HMAC with 7-round Whirlpool, while the previous best attack can work only for 6 rounds. Our approach is applying the meet-in-the-middle (MITM) attack on AES to recover MAC keys of Whirlpool. Several techniques are proposed to bypass different attack scenarios between a block cipher and a MAC, e.g., the chosen plaintext model of the MITM attacks on AES cannot be used for HMAC-Whirlpool. Besides, a larger state size and different key schedule designs of Whirlpool leave us a lot of room to study. As a result, equivalent keys of HMAC with 7-round Whirlpool are recovered with a complexity of (Data, Time, Memory) = (2 481.7, 2 482.3, 2 481).

Cite

CITATION STYLE

APA

Guo, J., Sasaki, Y., Wang, L., Wang, M., & Wen, L. (2015). Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8540, pp. 571–590). Springer Verlag. https://doi.org/10.1007/978-3-662-46706-0_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free