Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5

51Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

At Crypto '06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Conversely, at Asiacrypt '06, Contini and Yin used collision techniques to obtain forgery and partial key-recovery attacks on HMAC and NMAC instantiated with MD4, MD5, SHA-0 and reduced SHA-1. In this paper, we present the first full key-recovery attacks on NMAC and HMAC instantiated with a real-life hash function, namely MD4. Our main result is an attack on HMAC/NMAC-MD4 which recovers the full MAC secret key after roughly 2 88 MAC queries and 295 MD4 computations. We also extend the partial key-recovery Contini-Yin attack on NMAC-MD5 (in the relatedkey setting) to a full key-recovery attack. The attacks are based on generalizations of collision attacks to recover a secret IV, using new differential paths for MD4. © International Association for Cryptologic Research 2007.

Cite

CITATION STYLE

APA

Fouque, P. A., Leurent, G., & Nguyen, P. Q. (2007). Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4622 LNCS, pp. 13–30). Springer Verlag. https://doi.org/10.1007/978-3-540-74143-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free