New Distinguishing Attack on MAC Using Secret-Prefix Method

  • Authors:
  • Xiaoyun Wang;Wei Wang;Keting Jia;Meiqin Wang

  • Affiliations:
  • Center for Advanced Study, Tsinghua University, Beijing, China 100084 and Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, Jinan, Ch ...;Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100;Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100;Key Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100

  • Venue:
  • Fast Software Encryption
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a new distinguisher which can be applied to secret-prefix MACs with the message length prepended to the message before hashing. The new distinguisher makes use of a special truncated differential path with high probability to distinguish an inner near-collision in the first round. Once the inner near-collision is detected, we can recognize an instantiated MAC from a MAC with a random function. The complexity for distinguishing the MAC with 43-step reduced SHA-1 is 2124.5 queries. For the MAC with 61-step SHA-1, the complexity is 2154.5 queries. The success probability is 0.70 for both.