【24h】

Collision Attacks on AES-Based MAC: Alpha-MAC

机译:基于AES的MAC的碰撞攻击:Alpha-MAC

获取原文
获取原文并翻译 | 示例

摘要

Message Authentication Code construction Aired and its AES-based instance Alpha-MAC were introduced by Daemen and Ri-jmen in 2005. We show that under certain assumptions about its implementation (namely that keyed parts are perfectly protected against side-channel attacks but bulk hashing rounds are not) one can efficiently attack this function. We propose a side-channel collision attack on this MAC recovering its internal state just after 29 measurements in the known-message scenario which is to be compared to 40 measurements required by collision attacks on AES in the chosen-plaintext scenario. Having recovered the internal state, we mount a selective forgery attack using new 4 to 1 round collisions working with negligible memory and time complexity.
机译:消息认证代码的构造Aired及其基于AES的实例Alpha-MAC由Daemen和Ri-jmen于2005年引入。我们表明,在对其实现进行某些假设的情况下(即,对关键部分进行了完善的保护,使其免受侧信道攻击,但可以进行批量哈希处理)回合不是)可以有效地攻击此功能。我们提出在此MAC上进行一次侧信道冲突攻击,以在已知消息场景中进行29次测量后恢复其内部状态,并将其与选定明文场景中对AES进行碰撞攻击所需的40次测量进行比较。恢复内部状态后,我们使用新的4到1轮碰撞进行选择性的伪造攻击,而记忆和时间复杂度可忽略不计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号