Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

In this paper we discuss the security of PMAC, a provably secure and parallelizable MAC scheme proposed by Black and Rogaway, and Michell's TMAC variant, proposed to improve the security of TMAC. We show how to devise forgery attacks on PMAC and compare the success rate of our forgery attacks with their security bound. We also present forgery attacks on TMAC variant and show the security of TMAC variant is not improved in the sense of the forgery attack. Furthermore, key recovery attacks on PMAC and TMAC variant are presented in various parameters. Our results imply they have no significant advantage in comparison with other well-established MAC schemes.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication11th Australasian Conference, ACISP 2006, Proceedings
PublisherSpringer Verlag
Pages421-431
Number of pages11
ISBN (Print)3540354581, 9783540354581
DOIs
StatePublished - 2006
Event11th Australasian Conference on Information Security and Privacy, ACISP 2006 - Melbourne, Australia
Duration: 3 Jul 20065 Jul 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4058 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th Australasian Conference on Information Security and Privacy, ACISP 2006
Country/TerritoryAustralia
CityMelbourne
Period3/07/065/07/06

Keywords

  • CBC-MAC
  • Forgery Attacks
  • Key Recovery Attacks
  • MAC (Message Authentication Code)
  • PMAC
  • TMAC Variant

Fingerprint

Dive into the research topics of 'Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant'. Together they form a unique fingerprint.

Cite this