New Constructions of MACs from (Tweakable) Block Ciphers

  • Cogliati B
  • Lee J
  • Seurin Y
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for tweakable block cipher-based ones, or in the ideal cipher model for block cipher-based ones. All our constructions are very efficient, requiring only one call to the underlying (tweakable) block cipher in addition to universally hashing the message. Moreover, the security bounds we obtain are quite strong: they are beyond the birthday bound, and nonce-based/randomized variants provide graceful security degradation in case of misuse, i.e., the security bound degrades linearly with the maximal number of repetitions of nonces/random values.

Cite

CITATION STYLE

APA

Cogliati, B., Lee, J., & Seurin, Y. (2017). New Constructions of MACs from (Tweakable) Block Ciphers. IACR Transactions on Symmetric Cryptology, 27–58. https://doi.org/10.46586/tosc.v2017.i2.27-58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free