Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers
نویسندگان
چکیده
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
منابع مشابه
Analysis of Stream Cipher Based Authenticated Encryption Schemes
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric...
متن کاملTail-MAC: A Message Authentication Scheme for Stream Ciphers
Tail-MAC, A predecessor to the VMPC-MAC, algorithm for computing Message Authentication Codes for stream ciphers is described along with the analysis of its security. The proposed algorithm was designed to employ some of the data already computed by the underlying stream cipher in the purpose of minimizing the computational cost of the operations required by the MAC algorithm. The performed ana...
متن کاملTail-MAC: An Efficient Message Authentication Scheme for Stream Ciphers
A simple and software-efficient algorithm for computing Message Authentication Codes for stream ciphers is described along with the analysis its security. The proposed algorithm was designed to employ some of the data already computed by the underlying stream cipher in the purpose of minimizing the computational cost of the operations required by the MAC algorithm. The performed analyses indica...
متن کاملOn Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These include message authentication code (MAC), authenticated encryption (AE), authenticated encryption with associated data (AEAD) and deterministic authenticated encryption (DAE) with associated data. Several schemes ar...
متن کاملScaling VEST in Hardware
VEST is an exceptionally efficient cipher family that belongs to the most advanced type of design that offers multi-functionality in one highly efficient module. VEST is readily scaled in hardware. The problem of efficient generation of a secure message digest for scaled ciphers is overcome when VEST is combined with XOR-MAC. XOR-MAC technologies are proven secure but suffer performance restric...
متن کامل