Journal of mathematical cryptology | |
Indirect message injection for MAC generation | |
article | |
Mufeed Al Mashrafi1  Harry Bartlett1  Ed Dawson1  Leonie Simpson1  Kenneth Koon-Ho Wong1  | |
[1] Institute for Future Environments, Science and Engineering Faculty, Queensland University of Technology | |
关键词: MAC; stream ciphers; message injection; collision attacks; forgery attacks; side-channel attacks; | |
DOI : 10.1515/jmc-2013-5005 | |
学科分类:社会科学、人文和艺术(综合) | |
来源: De Gruyter | |
【 摘 要 】
Abstract. This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
【 授权许可】
CC BY|CC BY-NC-ND
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202107200005303ZK.pdf | 487KB | download |