Skip to main content
Top

1994 | OriginalPaper | Chapter

The Security of Cipher Block Chaining

Authors : Mihir Bellare, Joe Kilian, Phillip Rogaway

Published in: Advances in Cryptology — CRYPTO ’94

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

The Cipher Block Chaining — Message Authentication Code (CBC MAC) specifies that a message x = x1 . . . xm be authenticated among parties who share a secret key a by tagging x with a prefix of $$ f_a^{(m)} (x)\mathop = \limits^{def} f_a (f_a ( \ldots f_a (f_a (x_1 ) \oplus x_2 ) \oplus \ldots \oplus x_{m - 1} ) \oplus x_m ) $$ where f is some underlying block cipher (eg. f = DES). This method is a pervasively used international and U.S. standard. We provide its first formal justification, showing the following general lemma: that cipher block chaining a pseudorandom function gives a pseudorandom function. Underlying our results is a technical lemma of independent interest, bounding the success probability of a computationally unbounded adversary in distinguishing between a random ml-bit to l-bit function and the CBC MAC of a random l-bit to l-bit function.

Metadata
Title
The Security of Cipher Block Chaining
Authors
Mihir Bellare
Joe Kilian
Phillip Rogaway
Copyright Year
1994
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-48658-5_32

Premium Partner