Skip to main content

1999 | OriginalPaper | Buchkapitel

Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions

verfasst von : Jee Hea An, Mihir Bellare

Erschienen in: Advances in Cryptology — CRYPTO’ 99

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Practical MACs are typically designed by iterating applications of some fixed-input-length (FIL) primitive, namely one like a block cipher or compression function that only applies to data of a fixed length. Existing security analyses of these constructions either require a stronger security property from the FIL primitive (eg. pseudorandomness) than the unforgeability required of the final MAC, or, as in the case of HMAC, make assumptions about the iterated function itself. In this paper we consider the design of iterated MACs under the (minimal) assumption that the given FIL primitive is itself a MAC. We look at three popular transforms, namely CBC, Feistel and the Merkle-Damgård method, and ask for each whether it preserves unforgeability. We show that the answer is no in the first two cases and yes in the third. The last yields an alternative cryptographic hash function based MAC which is secure under weaker assumptions than existing ones, although at a slight increase in cost.

Metadaten
Titel
Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions
verfasst von
Jee Hea An
Mihir Bellare
Copyright-Jahr
1999
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-48405-1_16