Key recovery attacks on the RMAC, TMAC, and IACBC

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

The RMAC [6] is a variant of CBC-MAC, which resists birthday attacks and gives provably full security. The RMAC uses 2k-bit keys and the size of the RMAC is 2n, where n is the size of underlying block cipher. The TMAC [10] is the improved MAC scheme of XCBC [4] such that it requires (k +n)-bit keys while the XCBC requires (k +2n)-bit keys. In this paper, we introduce trivial key recovery attack on the RMAC with about 2n computations, which is more realistic than the attacks in [9]. Also we give a new attack on the TMAC using about 2n/2+1 texts, which can recover an (k + n)-bit key. However this attack can not be applied to the XCBC. Furthermore we analyzed the IACBC mode [8], which gives confidentiality and message integrity.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 8th Australasian Conference, ACISP 2003, Proceedings
EditorsRei Safavi-Naini, Jennifer Seberry
PublisherSpringer Verlag
Pages265-273
Number of pages9
ISBN (Print)3540405151, 9783540405153
DOIs
StatePublished - 2003
Event8th Australasian Conference on Information Security and Privacy, ACISP 2003 - Wollongong, Australia
Duration: 9 Jul 200311 Jul 2003

Publication series

NameLecture Notes in Computer Science
Volume2727
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th Australasian Conference on Information Security and Privacy, ACISP 2003
Country/TerritoryAustralia
CityWollongong
Period9/07/0311/07/03

Keywords

  • CBC-MAC
  • IACBC
  • Key recovery attacks
  • Message authentication codes
  • Modes of operation
  • RMAC
  • TMAC
  • XCBC

Fingerprint

Dive into the research topics of 'Key recovery attacks on the RMAC, TMAC, and IACBC'. Together they form a unique fingerprint.

Cite this