The MAC function Pelican 2.0
نویسندگان
چکیده
We present an update of the Pelican MAC function, called Pelican 2.0. Both versions have the Alred construction [5] and are based on Rijndael. they are a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. The difference between Pelican 2.0 and the original version is that the initial value changes from the all-zero string to another constant. The reason for this is the negative impact on security if key check values are available computed with a certain standard key check value algorithm that applies the block cipher to the zero string and takes as key check value its truncated output. The security impact of this on a number of standard MACs is studied in [11], and the analysis carries over for Pelican.
منابع مشابه
The Pelican MAC Function
We present new a MAC function based on Rijndael that is a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. This MAC function has the Alred construction [5] and can be seen as an optimized version of Alpha-MAC introduced in the same paper.
متن کاملRefinements of the ALRED construction and MAC security claims
We present three security claims for iterated MAC functions. Next, we propose Alred, a construction method for MAC functions based on a block cipher that has provable security in the absence of internal collisions. We apply this construction to AES resulting in two MAC functions: Alpha-MAC and Pelican. We provide a model for describing different types of internal collisions in Alred and provide...
متن کاملPelican DHCP Automated Self-Registration System: Distributed Registration and Centralized Management
Pelican is an automated DHCP client self-registration tool. Unlike other popular selfregistration tools, the Pelican registration system runs on an independent server with no access to the DHCP daemon’s lease data or configuration files. It derives MAC addresses by SNMPquerying network devices and periodically generating and pushing updated configuration files to all participating DHCP servers....
متن کاملImpossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
In this paper, the impossible differential cryptanalysis is extended to MAC algorithms Pelican, MT-MAC and PC-MAC based on AES and 4-round AES. First, we collect message pairs that produce the inner near-collision with some specific differences by the birthday attack. Then the impossible differential attack on 4-round AES is implemented using a 3-round impossible differential property. For Peli...
متن کاملOn Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have proposed a generic MAC construction ALRED and a concrete ALRED instance Pelican. The Pelican MAC uses four rounds of AES as a building block to compute the authentication tag in a CBC-like manner. It is about 2.5 times fas...
متن کامل