Abstract
A message authentication code (MAC) computes for each (arbitrarily long) message $$m$$m and key k a short authentication tag which is hard to forge when k is unknown. One of the most popular ways to process m in such a scheme is to use some variant of AES in CBC mode, and to derive the tag from the final ciphertext block. In this paper, we analyze the security of several proposals of this type, and show that they are vulnerable to a new type of attack which we call almost universal forgery, in which it is easy to generate the correct tag of any given message if the attacker is allowed to change a single block in it.
Original language | English |
---|---|
Pages (from-to) | 431-449 |
Number of pages | 19 |
Journal | Designs, Codes, and Cryptography |
Volume | 76 |
Issue number | 3 |
DOIs | |
State | Published - 6 Sep 2015 |
Bibliographical note
Publisher Copyright:© 2014, Springer Science+Business Media New York.
Keywords
- ALRED
- Almost Universal Forgery
- Message authentication codes
- Pelican
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science Applications
- Discrete Mathematics and Combinatorics
- Applied Mathematics