首页> 外文期刊>Journal of Cryptology >Partial Key Recovery Attack Against RMAC
【24h】

Partial Key Recovery Attack Against RMAC

机译:针对RMAC的部分密钥恢复攻击

获取原文
获取原文并翻译 | 示例
       

摘要

In this paper new "partial" key recovery attacks against the RMAC block cipher based Message Authentication Code scheme are described. That is we describe attacks that, in some cases, recover one of the two RMAC keys much more efficiently than previously described attacks. Although all attacks, but one, are of no major threat in practice, in some cases there is reason for concern. In particular, the recovery of the second RMAC key (of k bits) may only require around 2~(k/2) block cipher operations (encryptions or decryptions). The RMAC implementation using triple DES proposed by NIST is shown to be very weak.
机译:在本文中,描述了针对基于RMAC块密码的消息认证码方案的新的“部分”密钥恢复攻击。也就是说,我们描述的攻击在某些情况下比以前描述的攻击更有效地恢复两个RMAC密钥之一。尽管实际上只有一种攻击没有重大威胁,但在某些情况下还是值得关注的。特别地,第二(k个比特的)RMAC密钥的恢复可能仅需要大约2(k / 2)个分组密码操作(加密或解密)。 NIST提出的使用三重DES的RMAC实现非常弱。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号