1 MDx-MAC and Building Fast MACs from Hash Functions


We consider the security of message authentication code (MAC) algorithms, and the construction of MACs from fast hash functions. A new forgery attack applicable to all iterated MAC algorithms is described, the first known such attack requiring fewer operations than exhaustive key search. Existing methods for constructing MACs from hash functions, including… (More)

1 Figure or Table


  • Presentations referencing similar topics