This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining (CBC) mode. This attack detects a CBC-like MAC from random functions. The second result of this paper is a second-preimage attack on the CBC-MAC, which is an extension of the attack of Brincat and Mitchell. The attack also covers MT-MAC, PMAC and MACs with three-key enciphered CBC mode. Instead of exhaustive search, both types of attacks are of birthday attack complexity. © 2009 Springer-Verlag.
CITATION STYLE
Jia, K., Wang, X., Yuan, Z., & Xu, G. (2009). Distinguishing and second-preimage attacks on CBC-like MACs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5888 LNCS, pp. 349–361). https://doi.org/10.1007/978-3-642-10433-6_23
Mendeley helps you to discover research relevant for your work.