1 MDx-MAC and Building Fast MACs from Hash Functions

Abstract

We consider the security of message authentication code (MAC) algorithms, and the construction of MACs from fast hash functions. A new forgery attack applicable to all iterated MAC algorithms is described, the first known such attack requiring fewer operations than exhaustive key search. Existing methods for constructing MACs from hash functions, including… (More)

1 Figure or Table

Topics

  • Presentations referencing similar topics