Title
Parallelizable MAC revisited
Abstract
AbstractMessage authentication codes MACs are widely used in communication networks for authentication purposes. In EUROCRYPT 2002, Black and Rogaway proposed a parallelizable MAC PMAC, which is relatively efficient when a parallel environment is possible. This parallelism is achieved via constant multiplications in the underlying finite field. In order to yield a better solution, Rogaway refined PMAC in ASIACRYPT 2004 by using a powering-up construction to generate the constants. This is in contrast to the first design that uses successive words of the gray code to generate the constants. In this paper, we analyze how some unique characteristics of these constants result in weaknesses of the respective PMAC designs against forgery attacks in different ways. Thus, our analysis highlights some pitfalls that designers should be mindful of when designing schemes that exploit such constants. Copyright © 2013 John Wiley & Sons, Ltd.
Year
DOI
Venue
2014
10.1002/sec.842
Periodicals
Keywords
Field
DocType
communication networks,MAC,authentication,security analysis,forgery attack
Parallelizable manifold,Telecommunications network,Authentication,PMAC,Message authentication code,Computer security,Computer science,Gray code,Exploit,Theoretical computer science,Security analysis
Journal
Volume
Issue
ISSN
7
7
1939-0114
Citations 
PageRank 
References 
0
0.34
16
Authors
4
Name
Order
Citations
PageRank
Wun-She Yap110517.55
Sze Ling Yeo2408.76
Swee-Huay Heng338447.50
Matt Henricksen413113.55