Generic Related-Key Attacks for HMAC

被引:0
作者
Peyrin, Thomas [1 ]
Sasaki, Yu [2 ]
Wang, Lei [1 ,3 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[2] NTT Corp, NTT Secure Platform Labs, Tokyo, Tokyo, Japan
[3] Univ Electrocommun, Chofu, Tokyo, Japan
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012 | 2012年 / 7658卷
基金
新加坡国家研究基金会;
关键词
HMAC; hash function; distinguisher; forgery; related-key; RECOVERY ATTACKS; HASH FUNCTIONS; SECURITY; NMAC; HMAC/NMAC-MD4; HAVAL; PRFS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single relatedkey) for the HMAC construction. When HMAC uses a k-bit key, outputs an n-bit MAC, and is instantiated with an l-bit inner iterative hash function processing m-bit message blocks where m = k, our distinguishing-R attack requires about 2(n/2) queries which improves over the currently best known generic attack complexity 2(l/2) as soon as l > n. This means that contrary to the general belief, using wide-pipe hash functions as internal primitive will not increase the overall security of HMAC in the related-key model when the key size is equal to the message block size. We also present generic related-key distinguishing-H, internal state recovery and forgery attacks. Our method is new and elegant, and uses a simple cyclesize detection criterion. The issue in the HMAC construction (not present in the NMAC construction) comes from the non-independence of the two inner hash layers and we provide a simple patch in order to avoid this generic attack. Our work finally shows that the choice of the opad and ipad constants value in HMAC is important.
引用
收藏
页码:580 / 597
页数:18
相关论文
共 24 条
  • [1] [Anonymous], 1996, LNCS, DOI DOI 10.1007/3-540-68697-5_1
  • [2] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
  • [3] Bellare M, 2006, LECT NOTES COMPUT SC, V4117, P602
  • [4] Bertoni G., 2008, NIST UNPUB
  • [5] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
  • [6] Bogdanov A, 2008, LECT NOTES COMPUT SC, V5154, P283
  • [7] Brassard G., 1990, LNCS, V435
  • [8] Contini S, 2006, LECT NOTES COMPUT SC, V4284, P37
  • [9] Daemen Joan, 2020, Information Security and Cryptography, V2nd
  • [10] Dodis Y, 2011, LECT NOTES COMPUT SC, V6632, P323, DOI 10.1007/978-3-642-20465-4_19