Title of article :
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Author/Authors :
Rechberger, Christian Graz University of Technology - Institute for Applied Information Processing and Communications, Austria , Rijmen, Vincent Graz University of Technology - Institute for Applied Information Processing and Communications, Austria
From page :
347
To page :
376
Abstract :
Message Authentication Code (MAC) algorithms can provide cryptograph- ically secure authentication services. One of the most popular algorithms in commercial applications is HMAC based on the hash functions MD5 or SHA-1. In the light of new collision search methods for members of the MD4 family including SHA-1, the security of HMAC based on these hash functions is reconsidered. We present a new method to recover both the inner-and the outer key used in HMAC when instantiated with a concrete hash function by observing text/MAC pairs. In ad- dition to collisions, also other non-random properties of the hash function are used in this new attack. Among the examples of the proposed method, the first theoretical full key recovery attack on NMAC-MD5 is presented. Other examples are distinguishing, forgery and partial or full key recovery attacks on NMAC/HMAC-SHA-1 with a re- duced number of steps (up to 62 out of 80). This information about the new, reduced security margin serves as an input to the selection of algorithms for authentication purposes.
Keywords :
Key Words: cryptography , security , authentication Category: C.2.0 , D.4.6 , E.3 , K.6.5
Journal title :
Journal of J.UCS (Journal of Universal Computer Science)
Journal title :
Journal of J.UCS (Journal of Universal Computer Science)
Record number :
2661020
Link To Document :
بازگشت