首页> 外文会议>Information Security and Privacy >Key Recovery Attacks on the RMAC, TMAC, and IACBC
【24h】

Key Recovery Attacks on the RMAC, TMAC, and IACBC

机译:对RMAC,TMAC和IACBC的密钥恢复攻击

获取原文

摘要

The RMAC is a variant of CBC-MAC, which resists birthday attacks and gives provably full security. The RMAC uses 2k-bit keys and the size of the RMAC is 2n, where n is the size of underlying block cipher. The TMAC is the improved MAC scheme of XCBC such that it requires (k + n)-bit keys while the XCBC requires (k + 2n)-bit keys. In this paper, we introduce trivial key recovery attack on the RMAC with about 2~n computations, which is more realistic than the attacks in. Also we give a new attack on the TMAC using about 2~(n/2+1) texts, which can recover an (k + n)-bit key. However this attack can not be applied to the XCBC. Furthermore we analyzed the IACBC mode, which gives confidentiality and message integrity.
机译:RMAC是CBC-MAC的变体,可抵抗生日攻击并提供充分的安全性。 RMAC使用2k位密钥,RMAC的大小为2n,其中n是基础块密码的大小。 TMAC是XCBC的改进MAC方案,因此它需要(k + n)位密钥,而XCBC需要(k + 2n)位密钥。在本文中,我们用大约2〜n个计算介绍了对RMAC的琐碎密钥恢复攻击,这比其中的攻击更为真实。此外,我们还使用大约2〜(n / 2 + 1)个文本对TMAC进行了新的攻击,可以恢复(k + n)位的密钥。但是,这种攻击不能应用于XCBC。此外,我们分析了IACBC模式,该模式提供了机密性和消息完整性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号