Generic universal forgery attack on iterative hash-based MACs

18Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC, with regards to universal forgery attacks. Leveraging recent advances in the analysis of functional graphs built from the iteration of HMAC or NMAC, we exhibit the very first generic universal forgery attack against hash-based MACs. In particular, our work implies that the universal forgery resistance of an n-bit output HMAC construction is not 2n queries as long believed by the community. The techniques we introduce extend the previous functional graphs-based attacks that only took in account the cycle structure or the collision probability: we show that one can extract much more meaningful secret information by also analyzing the distance of a node from the cycle of its component in the functional graph. © 2014 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Peyrin, T., & Wang, L. (2014). Generic universal forgery attack on iterative hash-based MACs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8441 LNCS, pp. 147–164). Springer Verlag. https://doi.org/10.1007/978-3-642-55220-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free