The MAC function Pelican 2.0

نویسندگان

  • Joan Daemen
  • Vincent Rijmen
چکیده

We present an update of the Pelican MAC function, called Pelican 2.0. Both versions have the Alred construction [5] and are based on Rijndael. they are a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. The difference between Pelican 2.0 and the original version is that the initial value changes from the all-zero string to another constant. The reason for this is the negative impact on security if key check values are available computed with a certain standard key check value algorithm that applies the block cipher to the zero string and takes as key check value its truncated output. The security impact of this on a number of standard MACs is studied in [11], and the analysis carries over for Pelican.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Pelican MAC Function

We present new a MAC function based on Rijndael that is a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. This MAC function has the Alred construction [5] and can be seen as an optimized version of Alpha-MAC introduced in the same paper.

متن کامل

Refinements of the ALRED construction and MAC security claims

We present three security claims for iterated MAC functions. Next, we propose Alred, a construction method for MAC functions based on a block cipher that has provable security in the absence of internal collisions. We apply this construction to AES resulting in two MAC functions: Alpha-MAC and Pelican. We provide a model for describing different types of internal collisions in Alred and provide...

متن کامل

Pelican DHCP Automated Self-Registration System: Distributed Registration and Centralized Management

Pelican is an automated DHCP client self-registration tool. Unlike other popular selfregistration tools, the Pelican registration system runs on an independent server with no access to the DHCP daemon’s lease data or configuration files. It derives MAC addresses by SNMPquerying network devices and periodically generating and pushing updated configuration files to all participating DHCP servers....

متن کامل

Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES

In this paper, the impossible differential cryptanalysis is extended to MAC algorithms Pelican, MT-MAC and PC-MAC based on AES and 4-round AES. First, we collect message pairs that produce the inner near-collision with some specific differences by the birthday attack. Then the impossible differential attack on 4-round AES is implemented using a 3-round impossible differential property. For Peli...

متن کامل

On Efficient Message Authentication Via Block Cipher Design Techniques

In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have proposed a generic MAC construction ALRED and a concrete ALRED instance Pelican. The Pelican MAC uses four rounds of AES as a building block to compute the authentication tag in a CBC-like manner. It is about 2.5 times fas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014