计算机科学 ›› 2017, Vol. 44 ›› Issue (3): 192-194.doi: 10.11896/j.issn.1002-137X.2017.03.041

• 信息安全 • 上一篇    下一篇

iPMAC及VPMAC的伪造攻击

田玉丹,韦永壮   

  1. 广西信息科学实验中心桂林电子科技大学 桂林 541004,广西无线宽带通信与信号处理重点实验室桂林电子科技大学 桂林541004;广西云计算与大数据协同创新中心桂林电子科技大学 桂林541004
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金项目(61572148),广西自然科学基金项目(2015GXNSFGA139007),广西高等学校优秀中青年骨干教师培养工程(第二期),桂林电子科技大学研究生创新项目(YJCXS201525)资助

Forgery Attack on Authenticated Cipher Mode iPMAC and VPMAC

TIAN Yu-dan and WEI Yong-zhuang   

  • Online:2018-11-13 Published:2018-11-13

摘要: 消息认证码(MAC)是保证信息完整性传输的重要手段,目前已广泛应用于各种安全系统中。iPMAC 和 VPMAC 由于其平行的结构模式成为了消息认证码的典型代表。而 iPMAC 和 VPMAC 是否存在新的安全性问题,是目前业界讨论的热点问题之一。根据 iPMAC输入参数的可变性,利用碰撞的基本思想提出了针对 iPMAC 的伪造攻击。该攻击在已知输入输出对应关系的基础上寻找出一组新的对应关系。结果表明,该攻击经一次解密模型访问后成功伪造的概率为0.5。这一攻击同样适用于 VPMAC。

关键词: 消息认证,iPMAC,伪造攻击,VPMAC,认证加密

Abstract: Message authentication has received the wide spread attention after being proposed.iPMAC and VPMAC become the representative of message authentication due to its parallel structure model.Whether iPMAC and VPMAC are secure become a research focus.Based on the variable parameter Γ and Λ,we put forward a new forgery attack by ma-king use of the basic idea of the collision.Based on known relations,we found out a new set of corresponding relations.We created a successful forgery by making only one query to the decryption oracle with probability 0.5.This attack process also applies to VPMAC.

Key words: Message authentication,iPMAC,Forgery attack,VPMAC,Authenticated encryption

[1] GILBERT E,MACWILLIAMS F,SLOANE N.Codes which detect deception[J].Bell System Technical Journal,1974,3(3):405-424.
[2] PRENEEL B,VAN P Oorschot.MD-x MAC and building fast MACs from hash functions[C]∥Advances in Cryptology-Crypto 95 Proceedings.Lecture Notes in Computer Science,Vol.963,D.Coppersmith ed.,Springer-Verlag,1995.
[3] aSecure Hash Standardo.Federal Information Processing Stand-ards Publication 180-1[J].Us Dept of Commerce/nist National Technical Information Service, 1995.
[4] WANG P,FENG D G.To construct the MAC based on block cipher [J].Graduate School of Chinese Academy of Scien-ces Journa,2005,22(6):746-750.(in Chinese) 王鹏,冯登国.基于可调分组密码的MAC构造[J].中国科学院研究生院学报,2005,22(6):746-750.
[5] ISO/IEC 9797-1.Information technology-security techniques mes-sage authentication code(MACs)-part 1:Mechanism using a block cipher[S].International organization for standardization.geneve,swizerland,1999.
[6] BLACK J,ROGAWAY P.A block-cipher mode of operation for parallelizable message authentication[M]∥Lecture Notes in Computer Science 2332:Advances in cryptology-eurocrypt.2002:384-397.
[7] SARKAR P.Pseudo-random functions and parallelizable modes of operations of a block cipher[J].IEEE Transactions on Information Theory,2010,6(8):4025-4037.
[8] CAESAR-competition for authenticated encryption:security,applicability,and robustness.http://competitions.cr.yp.to/caesar.html.
[9] NASOUR B,JAVAD A,MOHAMMAD R.A single query forgery on avalanchev1[R].Cryptographic Competitions Mailing List,2014.
[10] GUY B.Forgery on stateless cmcc.http://eprint.iacr.org.
[11] CHAKRABORTY D,NANDI M.Attacks on the authenticated encryption mode of operation PAE[J].IEEE Transaction on Information Theory,2015,1(10):5636-5642 .
[12] BRINCAT K,MITCHELL C.New CBC-MAC forgery attacks[C]∥varadharajan,V,Mu,Y.(eds.) ACISP 2001.LNCS,Springer,Heidelberg,2119:3-14.
[13] CHEN J,HU Y P,WEI Y Z.A random message forgery attack on PMAC and TMAC-V[J].Chinese Journal of Computers,2007,30(10):1827-1832.(in Chinese) 陈杰,胡予濮,韦永壮.随机消息伪造攻击PMAC和TMAC-V[J].计算机学报,2007,30(10):1827-1832.
[14] CHAO S D,ZHANG Z L,TIAN H,et al.Improved PMAC and security analysis[J].Computer Engineering and Applications,2009,45(21):77-78.(in Chinese) 晁仕德,张绍兰,田华,等.改进的PMAC及安全性分析[J].计算机工程与应用,2009,45(21):77-78.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!