General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity

Abstract

Kim et al. [4] and Contini et al. [3] studied on the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Especially, they considered the distinguishing attacks. However, they did not describe generic distinguishing attacks on NMAC and HMAC. In this paper, we describe the generic distinguishers to distinguish NMAC and HMAC with the birthday… (More)

Topics

3 Figures and Tables

Cite this paper

@article{Chang2006GeneralDA, title={General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity}, author={Donghoon Chang and Mridul Nandi}, journal={IACR Cryptology ePrint Archive}, year={2006}, volume={2006}, pages={441} }