Abstract
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the Cary-Venkatesan MAC is that a lower bound on its security can be proved when a certain block cipher is modelled as an ideal cipher. Our attacks find collisions for the MAC and yield MAC forgeries, both faster than a straightforward application of the birthday paradox would suggest. For the suggested parameter sizes (where the MAC is 128 bits long) we give a method to find collisions using about 248.5 MAC queries, and to forge MACs using about 255 MAC queries. We emphasise that our results do not contradict the lower bounds on security proved by Cary and Venkatesan. Rather, they establish an upper bound on the MAC's security that is substantially lower than one would expect for a 128-bit MAC. © International Association for Cryptologic Research 2004.
Author supplied keywords
Cite
CITATION STYLE
Blackburn, S. R., & Paterson, K. G. (2004). Cryptanalysis of a message authentication code due to Cary and Venkatesan. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3017, 446–453. https://doi.org/10.1007/978-3-540-25937-4_28
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.