Security of the cipher block chaining message authentication code

375Citations
Citations of this article
111Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Let F be some block cipher (eg., DES) with block length l. The cipher block chaining message authentication code (CBC MAC) specifies that an m-block message x = x1···xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a prefix of ym, where Y0 = 0l and yi = Fa(mi⊕yi-1) for i = 1, 2, ..., m. This method is a pervasively used international and U.S. standard. We provide its first formal justification, showing the following general lemma: cipher block chaining a pseudorandom function yields a pseudorandom function. Underlying our results is a technical lemma of independent interest, bounding the success probability of a computationally unbounded adversary in distinguishing between a random ml-bit to l-bit function and the CBC MAC of a random l-bit to l-bit function.

Cite

CITATION STYLE

APA

Bellare, M., Kilian, J., & Rogaway, P. (2000). Security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3), 362–399. https://doi.org/10.1006/jcss.1999.1694

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free