Computer Science ›› 2017, Vol. 44 ›› Issue (3): 192-194.doi: 10.11896/j.issn.1002-137X.2017.03.041

Previous Articles     Next Articles

Forgery Attack on Authenticated Cipher Mode iPMAC and VPMAC

TIAN Yu-dan and WEI Yong-zhuang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Message authentication has received the wide spread attention after being proposed.iPMAC and VPMAC become the representative of message authentication due to its parallel structure model.Whether iPMAC and VPMAC are secure become a research focus.Based on the variable parameter Γ and Λ,we put forward a new forgery attack by ma-king use of the basic idea of the collision.Based on known relations,we found out a new set of corresponding relations.We created a successful forgery by making only one query to the decryption oracle with probability 0.5.This attack process also applies to VPMAC.

Key words: Message authentication,iPMAC,Forgery attack,VPMAC,Authenticated encryption

[1] GILBERT E,MACWILLIAMS F,SLOANE N.Codes which detect deception[J].Bell System Technical Journal,1974,3(3):405-424.
[2] PRENEEL B,VAN P Oorschot.MD-x MAC and building fast MACs from hash functions[C]∥Advances in Cryptology-Crypto 95 Proceedings.Lecture Notes in Computer Science,Vol.963,D.Coppersmith ed.,Springer-Verlag,1995.
[3] aSecure Hash Standardo.Federal Information Processing Stand-ards Publication 180-1[J].Us Dept of Commerce/nist National Technical Information Service, 1995.
[4] WANG P,FENG D G.To construct the MAC based on block cipher [J].Graduate School of Chinese Academy of Scien-ces Journa,2005,22(6):746-750.(in Chinese) 王鹏,冯登国.基于可调分组密码的MAC构造[J].中国科学院研究生院学报,2005,22(6):746-750.
[5] ISO/IEC 9797-1.Information technology-security techniques mes-sage authentication code(MACs)-part 1:Mechanism using a block cipher[S].International organization for standardization.geneve,swizerland,1999.
[6] BLACK J,ROGAWAY P.A block-cipher mode of operation for parallelizable message authentication[M]∥Lecture Notes in Computer Science 2332:Advances in cryptology-eurocrypt.2002:384-397.
[7] SARKAR P.Pseudo-random functions and parallelizable modes of operations of a block cipher[J].IEEE Transactions on Information Theory,2010,6(8):4025-4037.
[8] CAESAR-competition for authenticated encryption:security,applicability,and robustness.http://competitions.cr.yp.to/caesar.html.
[9] NASOUR B,JAVAD A,MOHAMMAD R.A single query forgery on avalanchev1[R].Cryptographic Competitions Mailing List,2014.
[10] GUY B.Forgery on stateless cmcc.http://eprint.iacr.org.
[11] CHAKRABORTY D,NANDI M.Attacks on the authenticated encryption mode of operation PAE[J].IEEE Transaction on Information Theory,2015,1(10):5636-5642 .
[12] BRINCAT K,MITCHELL C.New CBC-MAC forgery attacks[C]∥varadharajan,V,Mu,Y.(eds.) ACISP 2001.LNCS,Springer,Heidelberg,2119:3-14.
[13] CHEN J,HU Y P,WEI Y Z.A random message forgery attack on PMAC and TMAC-V[J].Chinese Journal of Computers,2007,30(10):1827-1832.(in Chinese) 陈杰,胡予濮,韦永壮.随机消息伪造攻击PMAC和TMAC-V[J].计算机学报,2007,30(10):1827-1832.
[14] CHAO S D,ZHANG Z L,TIAN H,et al.Improved PMAC and security analysis[J].Computer Engineering and Applications,2009,45(21):77-78.(in Chinese) 晁仕德,张绍兰,田华,等.改进的PMAC及安全性分析[J].计算机工程与应用,2009,45(21):77-78.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!