Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and universal forgery attacks was very recently shown to be suboptimal, following a series of surprising results by Leurent et al. and Peyrin et al.. These results have shown that such powerful attacks require much less than 2 ` computations, contradicting the common belief (where ` denotes the internal state size). In this work, we revisit and extend these results, with a focus on properties of concrete hash functions such as a limited message length, and special iteration modes. We begin by devising the first state-recovery attack on HMAC with a HAIFA hash function (using a block counter in every compression function call), with complexity 24`/5. Then...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Abstract. HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more gene...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC,...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication ser...
International audienceMessage Authentication Codes (MACs) are important cryptographic constructions ...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Abstract. HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more gene...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC,...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication ser...
International audienceMessage Authentication Codes (MACs) are important cryptographic constructions ...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Abstract. HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more gene...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...