Stronger security bounds for wegman-carter-shoup authenticators

48Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Shoup proved that various message-authentication codes of the form (n, m) → h(m) + f(n) are secure against all attacks that see at most ∫1/ε. authenticated messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ε is a differential probability associated with h. Shoup's result implies that if AES is secure then various state-of-the-art message-authentication codes of the form (n, m) H → h(m) + AESk(n) are secure up to ∫1/ε authenticated messages. Unfortunately, ∫1/ε is only about 250 for some state-of-the-art systems, so Shoup's result provides no guarantees for long-term keys. This paper proves that security of the same systems is retained up to ∫#G authenticated messages. In a typical state-of-the-art system, ∫#G is 264. The heart of the paper is a very general "one-sided" security theorem: (n, m) → h(m) + f(n) is secure if there are small upper bounds on differential probabilities for h and on interpolation probabilities for f. © International Association for Cryptologic Research 2005.

Cite

CITATION STYLE

APA

Bernstein, D. J. (2005). Stronger security bounds for wegman-carter-shoup authenticators. In Lecture Notes in Computer Science (Vol. 3494, pp. 164–180). Springer Verlag. https://doi.org/10.1007/11426639_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free