On the Security of Cipher Block Chaining Message Authentication Code

نویسندگان

  • Charles Rackoff
  • Serge Gorbunov
چکیده

In [4], Bernstein presented a simple proof of security of Cipher Block Chaining (CBC) Message Authentication Code (MAC) against adversaries querying messages all of which are of the same length. In this paper we show that Bernstein’s proof can be used to prove security of CBC MAC against adversaries querying non-empty messages that are not prefixes of each other. This implies that “length-prepend CBC MAC” presented by Bellare, Kilian, and Rogaway in [1] is a secure authentication method, handling variable message lengths.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AES-CCM Cipher Suites for Transport Layer Security (TLS)

This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained envir...

متن کامل

1 6 O ct 2 00 3 A HASH OF HASH FUNCTIONS

In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in [1], by including more details on block-cipher based hash functions and security of different hash schemes.

متن کامل

A Hash of Hash Functions

In this paper, we present a general review of hash functions in a cryptographic sense. We give special emphasis on some particular topics such as cipher block chaining message authentication code (CBC MAC) and its variants. This paper also broadens the information given in [1], by including more details on block-cipher based hash functions and security of different hash schemes.

متن کامل

Report on the Second Modes of Operation Workshop (August 2001)

Morris Dworkin, a mathematician from NIST’s Computer Security Division, served as the moderator of the workshop. He welcomed the attendees and introduced the other participants from NIST: Bill Burr, Elaine Barker, Aaron Nelson, and, at the registration table, Vickie Harris and Teresa Vicente. He reviewed the three current Federal Information Processing Standards (FIPS) that establish block ciph...

متن کامل

Report on the Second Modes of Operation Workshop [August 2001]

Morris Dworkin, a mathematician from NIST’s Computer Security Division, served as the moderator of the workshop. He welcomed the attendees and introduced the other participants from NIST: Bill Burr, Elaine Barker, Aaron Nelson, and, at the registration table, Vickie Harris and Teresa Vicente. He reviewed the three current Federal Information Processing Standards (FIPS) that establish block ciph...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010