L-collision Attacks against Randomized MACs

  • Authors:
  • Michael Semanko

  • Affiliations:
  • -

  • Venue:
  • CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added, however. This paper shows that prefixing randomness to a message before running the message through an iterated MAC leads to an attack that takes only O (2(l+r)/3 + max{2l/2, 2r/2}) queries to break, where l is the size of the MAC iteration output and r is the size of the prefixed randomness.