How to Thwart Birthday Attacks against MACs via Small Randomness

@inproceedings{Minematsu2010HowTT,
  title={How to Thwart Birthday Attacks against MACs via Small Randomness},
  author={Kazuhiko Minematsu},
  booktitle={FSE},
  year={2010}
}
The security of randomized message authentication code, MAC for short, is typically depending on the uniqueness of random initial vectors (IVs). Thus its security bound usually contains O(q/2), when random IV is n bits and q is the number of MACed messages. In this paper, we present how to break this birthday barrier without increasing the randomness. Our proposal is almost as efficient as the well-known Carter-Wegman MAC, uses n-bit random IVs, and provides the security bound roughly O(q/2… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

Advances in Cryptology – ASIACRYPT 2012

Lecture Notes in Computer Science • 2012
View 20 Excerpts
Highly Influenced

Tight Security Analysis of EHtM MAC

IACR Cryptology ePrint Archive • 2017
View 7 Excerpts
Highly Influenced

Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions

IACR Cryptology ePrint Archive • 2016
View 10 Excerpts
Highly Influenced

On the Influence of Message Length in PMAC's Security Bounds

IACR Cryptology ePrint Archive • 2016
View 4 Excerpts
Highly Influenced

Generic Attacks against Beyond-Birthday-Bound MACs

IACR Cryptology ePrint Archive • 2018
View 6 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 25 references

Indistinguishability of Random Systems

EUROCRYPT • 2002
View 5 Excerpts
Highly Influenced

MAC Reforgeability.” Fast Software Encryption, FSE’09

J. Black, M. Cochran
LNCS 5665, • 2009
View 4 Excerpts
Highly Influenced

FRMAC, a Fast Randomized Message Authentication Code

IACR Cryptology ePrint Archive • 2004
View 4 Excerpts
Highly Influenced

Improved security analysis for OMAC as a pseudorandom function

J. Mathematical Cryptology • 2009
View 3 Excerpts

Similar Papers

Loading similar papers…