【24h】

Optimal Forgeries Against Polynomial-Based MACs and GCM

机译:针对基于多项式的MAC和GCM的最优伪造

获取原文

摘要

Polynomial-based authentication algorithms, such as GCM and Polyl305, have seen widespread adoption in practice. Due to their importance, a significant amount of attention has been given to understanding and improving both proofs and attacks against such schemes. At EUROCRYPT 2005, Bernstein published the best known analysis of the schemes when instantiated with PRPs, thereby establishing the most lenient limits on the amount of data the schemes can process per key. A long line of work, initiated by Handschuh and Preneel at CRYPTO 2008, finds the best known attacks, advancing our understanding of the fragility of the schemes. Yet surprisingly, no known attacks perform as well as the predicted worst-case attacks allowed by Bernstein's analysis, nor has there been any advancement in proofs improving Bernstein's bounds, and the gap between attacks and analysis is significant. We settle the issue by finding a novel attack against polynomial-based authentication algorithms using PRPs, and combine it with new analysis, to show that Bernstein's bound, and our attacks, are optimal.
机译:基于多项式的身份验证算法(例如GCM和Poly1303)已在实践中得到广泛采用。由于它们的重要性,已经极大地关注了对这种方案的证明和攻击的理解和改进。在2005年EUROCRYPT上,Bernstein发布了用PRP实例化的方案的最著名分析,从而对方案每个键可处理的数据量建立了最宽松的限制。由Handchuh和Preneel在CRYPTO 2008上发起的一项漫长的工作是发现最著名的攻击,这加深了我们对这些计划的脆弱性的理解。但是令人惊讶的是,没有已知的攻击能够像伯恩斯坦的分析所允许的那样预测最坏情况下的攻击,并且在改善伯恩斯坦边界的证据上也没有任何进展,并且攻击与分析之间的差距是巨大的。通过找到针对使用PRP的基于多项式的身份验证算法的新型攻击,并将其与新的分析相结合,我们解决了该问题,以证明Bernstein的界和我们的攻击是最优的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号