首页> 外文期刊>Journal of Cryptology >CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
【24h】

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions

机译:任意长度消息的CBC MAC:三键构造

获取原文
获取原文并翻译 | 示例
       

摘要

We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M ∈{0, 1}~* using max{1, [|M|]} applications of the underlying n-bit block cipher. Our favorite construction, XCBC, works like this: if |M| is a positive multiple of n then XOR the n-bit key K2 with the last block of M and compute the CBC MAC keyed with K1; otherwise, extend M's length to the next multiple of n by appending minimal 10~l padding (l ≥ 0), XOR the n-bit key K3 with the last block of the padded message, and compute the CBC MAC keyed with K1. We prove the security of this and other constructions, giving concrete bounds on an adversary's inability to forge in terms of his inability to distinguish the block cipher from a random permutation. Our analysis exploits new ideas which simplify proofs compared with prior work.
机译:我们建议使用一些简单的CBC MAC变体,以实现对任意长度消息的有效身份验证。我们的构造使用三个密钥K1,K2,K3来避免不必要的填充和MAC使用底层n位块的max {1,[| M | / n]}应用来避免任何消息M∈{0,1}〜*密码。我们最喜欢的结构XCBC的工作方式是:if | M |是n的正整数,然后将n位密钥K2与M的最后一个块进行异或运算,并计算以K1为密钥的CBC MAC;否则,通过附加最小的10〜l填充(l≥0),将M的长度扩展到n的下一个倍数,将n位密钥K3与填充消息的最后一块进行XOR运算,并计算以K1为密钥的CBC MAC。我们证明了这种结构和其他结构的安全性,从对手无法区分分组密码和随机排列的角度出发,为对手无法伪造给出了具体界限。我们的分析采用了新的想法,与以前的工作相比,它们简化了证明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号