We investigate a general paradigm for constructing arbitrary-input-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency parameter of such constructions, and give a simple and general security proof technique applicable to very general constructions. We propose concrete, essentially optimal constructions for practical use, Chain-Shift (CS) and Chain-Rotate (CR), and prove their security. They are superior to the best previously known construction, the NI-construction proposed by An and Bellare: Only one rather than two secret keys are required, the efficiency is improved, and the message space is truly AIL, i.e., there is no upper bound on the message length. The generality of our proof technique is also illustrated by giving a simple security proof of the NI-construction and several improvements thereof. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Maurer, U., & Sjödin, J. (2005). Single-key AIL-MACs from any FIL-MAC. In Lecture Notes in Computer Science (Vol. 3580, pp. 472–484). Springer Verlag. https://doi.org/10.1007/11523468_39
Mendeley helps you to discover research relevant for your work.