Modes of Operation of Stream Ciphers
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Grain: a stream cipher for constrained environments
International Journal of Wireless and Mobile Computing
Analysis of message injection in stream cipher-based hash functions
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Grain-128a: a new version of Grain-128 with optional authentication
International Journal of Wireless and Mobile Computing
Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm 128-EIA3
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
SAT based analysis of LTE stream cipher ZUC
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.