Abstract. We consider the security of message authentication code (MAC) algorithms, and the construction of MACs from fast hash func-tions. A new forgery attack applicable to all iterated MAC algorithms is described, the ¯rst known such attack requiring fewer operations than ex-haustive key search. Existing methods for constructing MACs from hash functions, including the secret pre¯x, secret su±x, and envelope meth-ods, are shown to be unsatisfactory. Motivated by the absence of a secure, fast MAC algorithm not based on encryption, a new generic construction (MDx-MAC) is proposed for transforming any secure hash function of the MD4-family into a secure MAC of equal or smaller bitlength and comparable speed.
The verification of the authenticity of a text document or a datafile is one of the main application...
The main purpose of Message Authentication is to prevent manipulation of the message which is sent. ...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
The security of iterated message authentication code (MAC) algorithms is considered, and in particul...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
The verification of the authenticity of a text document or a datafile is one of the main application...
The main purpose of Message Authentication is to prevent manipulation of the message which is sent. ...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
The security of iterated message authentication code (MAC) algorithms is considered, and in particul...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
International audienceMessage authentication codes (MACs) are an essential primitive in cryptography...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
The verification of the authenticity of a text document or a datafile is one of the main application...
The main purpose of Message Authentication is to prevent manipulation of the message which is sent. ...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...