The Pelican MAC Function
نویسندگان
چکیده
We present new a MAC function based on Rijndael that is a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. This MAC function has the Alred construction [5] and can be seen as an optimized version of Alpha-MAC introduced in the same paper.
منابع مشابه
The MAC function Pelican 2.0
We present an update of the Pelican MAC function, called Pelican 2.0. Both versions have the Alred construction [5] and are based on Rijndael. they are a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. The difference between Pelican 2.0 and the original version is that the initial value changes from the all-zero string to another consta...
متن کاملRefinements of the ALRED construction and MAC security claims
We present three security claims for iterated MAC functions. Next, we propose Alred, a construction method for MAC functions based on a block cipher that has provable security in the absence of internal collisions. We apply this construction to AES resulting in two MAC functions: Alpha-MAC and Pelican. We provide a model for describing different types of internal collisions in Alred and provide...
متن کاملPelican DHCP Automated Self-Registration System: Distributed Registration and Centralized Management
Pelican is an automated DHCP client self-registration tool. Unlike other popular selfregistration tools, the Pelican registration system runs on an independent server with no access to the DHCP daemon’s lease data or configuration files. It derives MAC addresses by SNMPquerying network devices and periodically generating and pushing updated configuration files to all participating DHCP servers....
متن کاملImpossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
In this paper, the impossible differential cryptanalysis is extended to MAC algorithms Pelican, MT-MAC and PC-MAC based on AES and 4-round AES. First, we collect message pairs that produce the inner near-collision with some specific differences by the birthday attack. Then the impossible differential attack on 4-round AES is implemented using a 3-round impossible differential property. For Peli...
متن کاملOn Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have proposed a generic MAC construction ALRED and a concrete ALRED instance Pelican. The Pelican MAC uses four rounds of AES as a building block to compute the authentication tag in a CBC-like manner. It is about 2.5 times fas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2005 شماره
صفحات -
تاریخ انتشار 2005