How to construct random functions
Journal of the ACM (JACM)
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Proceedings of the Third International Workshop on Fast Software Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Collision Attacks on AES-Based MAC: Alpha-MAC
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Improved MACs from Differentially-Uniform Permutations
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
New Birthday Attacks on Some MACs Based on Block Ciphers
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
A new paradigm for collision-free hashing: incrementality at reduced cost
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A new MAC construction alred and a specific instance ALPHA-MAC
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Refined analysis of bounds related to linear and differential cryptanalysis for the AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Hi-index | 0.00 |
The Alred construction is a lightweight strategy for constructing Message Authentication Codes (MACs). Although its original analysis shows that this construction is secure against attacks not involving internal collisions, it is unclear if the same is valid in a more generic scenario. In this paper, we complement that analysis, showing that one can expect a reasonable security level even when attackers try to explore such collisions. More specifically, we use the game-playing technique to formally evaluate the security of one Alred instance, Marvin, bounding its security in a quantitative manner; the security analysis is in the concrete-security paradigm. We then show how the concepts involved can be used in the analysis of Pelican, which follows the same design principles.