Analysis of indirect message injection for MAC generation using stream ciphers

  • Authors:
  • Mufeed ALMashrafi;Harry Bartlett;Leonie Simpson;Ed Dawson;Kenneth Koon-Ho Wong

  • Affiliations:
  • Information Security Institute, Queensland University of Technology, Brisbane, Qld, Australia, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Qld, Australia;Information Security Institute, Queensland University of Technology, Brisbane, Qld, Australia, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Qld, Australia;Information Security Institute, Queensland University of Technology, Brisbane, Qld, Australia, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Qld, Australia;Information Security Institute, Queensland University of Technology, Brisbane, Qld, Australia, Science and Engineering Faculty, Queensland University of Technology, Brisbane, Qld, Australia;Information Security Institute, Queensland University of Technology, Brisbane, Qld, Australia

  • Venue:
  • ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.