A main contribution of this paper is an improved analysis against HMAC instantiating with reduced Whirlpool. It recovers equivalent keys, which are often denoted as K in and K out, of HMAC with 7-round Whirlpool, while the previous best attack can work only for 6 rounds. Our approach is applying the meet-in-the-middle (MITM) attack on AES to recover MAC keys of Whirlpool. Several techniques are proposed to bypass different attack scenarios between a block cipher and a MAC, e.g., the chosen plaintext model of the MITM attacks on AES cannot be used for HMAC-Whirlpool. Besides, a larger state size and different key schedule designs of Whirlpool leave us a lot of room to study. As a result, equivalent keys of HMAC with 7-round Whirlpool are recovered with a complexity of (Data, Time, Memory) = (2 481.7, 2 482.3, 2 481).
CITATION STYLE
Guo, J., Sasaki, Y., Wang, L., Wang, M., & Wen, L. (2015). Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8540, pp. 571–590). Springer Verlag. https://doi.org/10.1007/978-3-662-46706-0_29
Mendeley helps you to discover research relevant for your work.