Handbook of Applied Cryptography
Handbook of Applied Cryptography
On the security of iterated message authentication codes
IEEE Transactions on Information Theory
Optimized Self-Synchronizing Mode of Operation
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Breaking Legacy Banking Standards with Special-Purpose Hardware
Financial Cryptography and Data Security
Distinguishing and Second-Preimage Attacks on CBC-Like MACs
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A new MAC construction alred and a specific instance ALPHA-MAC
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Hi-index | 0.00 |
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, these techniques will work when the MAC calculation involves prefixing the data to be MACed with a 'length block'. These attack methods provide new (tighter) upper bounds on the level of security offered by the MacDES technique.