...
首页> 外文期刊>IEICE Transactions on Information and Systems >Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
【24h】

Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC

机译:两种基于MD5的身份验证协议的密码分析:APOP和NMAC

获取原文
获取原文并翻译 | 示例

摘要

Many hash-based authentication protocols have been proposed, and proven secure assuming that underlying hash functions are secure. On the other hand, if a hash function compromises, the security of authentication protocols based on this hash function becomes unclear. Therefore, it is significantly important to verify the security of hash-based protocols when a hash function is broken.rnIn this paper, we will re-evaluate the security of two MD5-based authentication protocols based on a fact that MD5 cannot satisfy a required fundamental property named collision resistance. The target protocols are APOP (Authenticated Post Office Protocol) and NMAC (Nested Message Authentication Code), since they or their variants are widely used in real world. For security evaluation of APOP, we will propose a modified password recovery attack procedure, which is twice as fast as previous attacks. Moreover, our attack is more realistic, as the probability of being detected is lower than that of previous attacks. For security evaluation of MD5-based NMAC, we will propose a new key-recovery attack procedure, which has a complexity lower than that of previous attack. The complexity of our attack is 2~(76), while that of previous attack is 2~(100).Moreover, our attack has another interesting point. NMAC has two keys: the inner key and the outer key. Our attack can recover the outer key partially without the knowledge of the inner key.
机译:已经提出了许多基于散列的认证协议,并且在假定基础散列函数是安全的情况下被证明是安全的。另一方面,如果散列函数受损,则基于该散列函数的认证协议的安全性将变得不清楚。因此,当散列函数被破坏时,验证基于散列的协议的安全性非常重要。本文将基于MD5无法满足要求的事实,重新评估两种基于MD5的身份验证协议的安全性。基本特性称为抗碰撞性。目标协议是APOP(经过认证的邮局协议)和NMAC(嵌套消息认证代码),因为它们或其变体在现实世界中被广泛使用。为了评估APOP的安全性,我们将提出一种经过修改的密码恢复攻击程序,该程序的速度是以前攻击的两倍。此外,我们的攻击更为现实,因为被检测到的概率比以前的攻击要低。为了评估基于MD5的NMAC的安全性,我们将提出一种新的密钥恢复攻击过程,该过程的复杂度低于以前的攻击。我们的攻击复杂度为2〜(76),而之前的攻击复杂度为2〜(100)。此外,我们的攻击还有另一个有趣的地方。 NMAC有两个密钥:内部密钥和外部密钥。我们的攻击可以在不了解内部密钥的情况下部分恢复外部密钥。

著录项

  • 来源
    《IEICE Transactions on Information and Systems 》 |2010年第5期| P.1087-1095| 共9页
  • 作者单位

    University of Electro-Communications, Chofu-shi, 182-8585 Japan;

    rnUniversity of Electro-Communications, Chofu-shi, 182-8585 Japan;

    rnUniversity of Electro-Communications, Chofu-shi, 182-8585 Japan NTT Information Sharing Platform Laboratories, NTT Corporation, Musashino-shi, 180-8585 Japan;

    rnUniversity of Electro-Communications, Chofu-shi, 182-8585 Japan;

    rnUniversity of Tokyo, Kashiwa-shi, 277-8561 Japan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    authentication protocol; APOP; NMAC; MD5;

    机译:认证协议;APOP;NMAC;MD5;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号