Equivalent key recovery attack on H2-MAC instantiated with MD5

3Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents the first equivalent key recovery attack on H 2-MAC-MD5, which conduces to a selective forgery attack directly. H2-MAC is similar with HMAC except that the outer key is omitted. For HMAC-MD5, since the available differential paths are pseudo-collisions, all the key recovery attacks are in the related-key setting, while our attack on H 2-MAC-MD5 gets rid of this restriction. Based on the distinguisher of HMAC-MD5 proposed by Wang et al., a pair of intermediate chaining variables, i.e., the equivalent keys (K̃, K̃′), is detected which fulfils the specific conditions on (IV,IV′) of the pseudo-collision. Then the inner key recovery attack on HMAC-MD5 explored by Contini and Yin is adopted to recover (K̃, K̃′). Consequently, the adversary can compute the valid MAC value of M0||M* effortlessly, where M0 is a fixed one-block message, and M* can be any bit string. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Wang, W. (2011). Equivalent key recovery attack on H2-MAC instantiated with MD5. In Communications in Computer and Information Science (Vol. 200 CCIS, pp. 11–20). https://doi.org/10.1007/978-3-642-23141-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free