New Distinguishing Attack on MAC Using Secret-Prefix Method

@inproceedings{Wang2009NewDA,
  title={New Distinguishing Attack on MAC Using Secret-Prefix Method},
  author={Xiaoyun Wang and Wei Wang and Keting Jia and Meiqin Wang},
  booktitle={FSE},
  year={2009}
}
This paper presents a new distinguisher which can be applied to secret-prefix MACs with the message length prepended to the message before hashing. The new distinguisher makes use of a special truncated differential path with high probability to distinguish an inner near-collision in the first round. Once the inner near-collision is detected, we can recognize an instantiated MAC from a MAC with a random function. The complexity for distinguishing the MAC with 43-step reduced SHA-1 is 2124.5… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-6 OF 6 CITATIONS

Practical Key Recovery Attack against Secret-prefix Edon-R

  • IACR Cryptology ePrint Archive
  • 2009
VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Distinguishing Attack on MAC with Enveloped Method Using MD5

  • 2011 International Conference on Network Computing and Information Security
  • 2011
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Practical Key Recovery Attack against Secret-IV Edon-

  • CT-RSA
  • 2010
VIEW 3 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 20 REFERENCES