Distinguishing and Second-Preimage Attacks on CBC-Like MACs

  • Authors:
  • Keting Jia;Xiaoyun Wang;Zheng Yuan;Guangwu Xu

  • Affiliations:
  • Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100;Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100 and Institute for Advanced Study, Tsinghua University, Beijing, C ...;Institute for Advanced Study, Tsinghua University, Beijing, China 100084 and Beijing Electronic Science and Technology Institute, Beijing, China 100070;Institute for Advanced Study, Tsinghua University, Beijing, China 100084 and Department of Electrical Engineering and Computer Science, University of Wisconsin-Milwaukee, USA

  • Venue:
  • CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining (CBC) mode. This attack detects a CBC-like MAC from random functions. The second result of this paper is a second-preimage attack on the CBC-MAC, which is an extension of the attack of Brincat and Mitchell. The attack also covers MT-MAC, PMAC and MACs with three-key enciphered CBC mode. Instead of exhaustive search, both types of attacks are of birthday attack complexity.