Abstract | ||
---|---|---|
Based on the three earlier MAC (Message Authentication Code) construction approaches, we propose and analyze some variants of NMAC. We propose some key recovery attacks to these NMAC variants, for example, we can recover the equivalent inner key of NMAC in about O(2n/2) MAC operations, in a related key setting. We propose NMAC-E, a variant of NMAC with secret envelop, to achieve more process efficiency and no loss of security, which needs only one call to the underlying hash function, instead of two invocations in HMAC. |
Year | DOI | Venue |
---|---|---|
2011 | 10.12928/TELKOMNIKA.v11i2.829 | Telkomnika |
Keywords | Field | DocType |
birthday attack,equivalent key recovery,keying hash function,mac forgery,nmac | Hash-based message authentication code,Message authentication code,Computer science,Computer security,Birthday attack,Hash function,Process efficiency,Key recovery | Journal |
Volume | Issue | ISSN |
11 | 2 | 23029293 |
Citations | PageRank | References |
0 | 0.34 | 30 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Fanbao Liu | 1 | 29 | 4.40 |
Changxiang Shen | 2 | 127 | 14.57 |
Tao Xie | 3 | 50 | 5.91 |
Deng-Guo Feng | 4 | 1991 | 190.95 |