首页> 外文会议>International Conference on Information Technology, Information Systems and Electrical Engineering >Second preimage attack method on various MAC constructions and its application with AES-128
【24h】

Second preimage attack method on various MAC constructions and its application with AES-128

机译:各种MAC结构上的第二种原像攻击方法及其在AES-128中的应用

获取原文

摘要

A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, ECBC-MAC, FCBC-MAC, XCBC-MAC, RMAC, TMAC, OMAC and CMAC are some of MAC constructions that used in the hash function. In this paper, we propose a method of second preimage attack that utilizes the concept of existential forgery on CBC-MAC and it can be used on all of that various MAC construction. We apply the method to find second preimage on that various MAC constructions which uses AES-128 block cipher algorithm in its basic construction for the proof that the method is working. The results show that with the modifications as many as 220 for each sample, we can obtain the second preimages easily as many as 220 in that various MAC constructions.
机译:可以基于分组密码算法来构造消息认证码(MAC)。 CBC-MAC,EMAC,ECBC-MAC,FCBC-MAC,XCBC-MAC,RMAC,TMAC,OMAC和CMAC是在哈希函数中使用的一些MAC结构。在本文中,我们提出了一种第二次原图像攻击的方法,该方法利用了CBC-MAC上存在伪造的概念,并且可以用于所有各种MAC构建中。我们使用该方法在各种MAC结构上找到第二个原像,在其基本结构中使用AES-128分组密码算法,以证明该方法有效。结果表明,通过对每个样本进行多达220个修改,在各种MAC结构中,我们可以轻松获得多达220个第二原像。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号