首页> 外文会议>Annual International Cryptology Conference >Updates on Generic Attacks against HMAC and NMAC
【24h】

Updates on Generic Attacks against HMAC and NMAC

机译:对HMAC和NMAC通用攻击的更新

获取原文

摘要

In this paper, we present new generic attacks against HMAC and other similar MACs when instantiated with an n-bit output hash function maintaining a l-bit internal state. Firstly, we describe two types of selective forgery attacks (a forgery for which the adversary commits on the forged message beforehand). The first type is a tight attack which requires O(2~(l/2)) computations, while the second one requires O(2~(2l/3)) computations, but offers much more freedom degrees in the choice of the committed message. Secondly, we propose an improved universal forgery attack which significantly reduces the complexity of the best known attack from O(2~(5l/6)) to O(2~(3l/4)). Finally, we describe the very first time-memory tradeoff for key recovery attack on HMAC. With O(2~l) precomputation, the internal key K_(out) is firstly recovered with O(2~(2l/3)) computations by exploiting the Hellman's time-memory tradeoff, and then the other internal key K_(in) is recovered with O(2~(3l/4)) computations by a novel approach. This tends to indicate an inefficiency in using long keys for HMAC.
机译:在本文中,我们在使用维护L位内部状态的n位输出哈希函数时,我们对HMAC和其他类似MAC的新通用攻击。首先,我们描述了两种类型的选择性伪造攻击(事先对伪造信息上的伪造伪造)。第一种类型是一个紧张的攻击,需要O(2〜(L / 2))计算,而第二个则需要O(2〜(2L / 3))计算,但在所提出的选择中提供了更多的自由度信息。其次,我们提出了一种改进的通用伪造攻击,从而显着降低了从O(2〜(5L / 6))至O(2〜(3L / 4))的最佳已知攻击的复杂性。最后,我们描述了对HMAC的关键恢复攻击的第一个时间内存权衡。使用O(2〜L)预计,通过利用Hellman的时间内存折衷首先使用O(2〜(2L / 3))计算来恢复内部密钥K_(OUT),然后使用其他内部密钥K_(in)通过新方法用O(2〜(3L / 4))计算恢复。这倾向于表示使用HMAC的长键的效率低下。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号