A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
[chapter]
2000
Lecture Notes in Computer Science
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. ...
These attack methods provide new (tighter) upper bounds on the level of security offered by the MacDES technique. ...
We now consider how truncation affects the key recovery and forgery attacks described above.
Key recovery attacks The key recovery attacks no longer work as described. ...
doi:10.1007/3-540-44598-6_11
fatcat:mry7azpcvrew5c5mtiba2q3gtu
Cryptanalysis of message authentication codes
[chapter]
1998
Lecture Notes in Computer Science
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery attacks on MACs. ...
Subsequently an overview is presented of most MAC constructions and on attacks on these algorithms. ...
Weaknesses of the algorithm The above attacks assume that no shortcuts exist to break the MAC algorithm (either for forgery or for key recovery). ...
doi:10.1007/bfb0030408
fatcat:eqqgqfxzfvcdzgk5xuuz5mlzge
Page 6318 of Mathematical Reviews Vol. , Issue 2002H
[page]
2002
Mathematical Reviews
(N-BERG-I; Bergen); Mitchell, Chris J. (4-LNDHB-IS; Egham) Key recovery and forgery attacks on the MacDES MAC algorithm. ...
Summary: “We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. ...
Batch verifying multiple DSA-type digital signatures
1998
Electronics Letters
., and YEUNG, M.M.: 'Analysis and synthesis for new digital video applications'. IEEE ICIP Conf. ...
., and YEO, B : 'Video visualisation for compact presentation and fast browsing of pictorial content', ZEEE Trans. Circuits Syst. ...
r 2 T 3 = (gmls:+m2s;fm3s~yrls;+Tzsafr3sb mod p ) mod Lim and Lee's attack: Based on Lim and Lee's attack, any attacker can easily forge signatures to satisfy the batch verification criterion without knowing ...
doi:10.1049/el:19980620
fatcat:pm6kwsatarhaffzjijwelrj3gm
Page 2294 of Mathematical Reviews Vol. , Issue 2002C
[page]
2002
Mathematical Reviews
Knudsen and Chris J. Mitchell, Key recovery and forgery attacks on the MacDES MAC algorithm (184-196). ...
John Black and Phillip Rogaway, CBC MACs for arbitrary- length messages: the three-key constructions (197-215); Michael Semanko, L-collision attacks against randomized MACs (216 228); Jean-Sébastien Coron ...
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
[chapter]
2015
Lecture Notes in Computer Science
ISO/IEC 9797-1:2011 illustrates a total of ten CBC MACs, where one of these MACs, the basic CBC MAC, is widely known to be insecure. ...
We first show attacks against five MACs by taking advantage of the knowledge of the key check value. We then prove that the analysis is tight, in a concrete security paradigm. ...
We note that there are other attacks for all these MACs, e.g., a key recovery attack. See [15] and [29] for more details. ...
doi:10.1007/978-3-662-46706-0_16
fatcat:5puswlk3fndlrlafxpxkyklmv4
On the Security of Double and 2-Key Triple Modes of Operation
[chapter]
1999
Lecture Notes in Computer Science
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). ...
It also presents an improved attack on multiple modes that contain an OFB mode and discusses practical solutions that take into account realistic constraints. ...
We leave it as an open problem to improve the attacks on the schemes listed in Table 2 . ...
doi:10.1007/3-540-48519-8_16
fatcat:cuhyuywwnvftnnfsrkqrmoupbu
Page 2768 of Mathematical Reviews Vol. , Issue Subject Index
[page]
Mathematical Reviews
Key recovery and forgery attacks on the MacDES MAC algorithm. (English summary) 2002h:94076
— Weakness in quaternion signatures. ...
[Security in payment systems on the basis of digital money] 2002f:94050
Ng, Siaw-Lynn (with Walker, Michael) On the composition of matroids and ideal secret sharing schemes. ...
Page 994 of Mathematical Reviews Vol. , Issue Author Index
[page]
Mathematical Reviews
Key recovery and forgery attacks on the MacDES MAC algorithm. (English summary) Advances in cryptology—CRYPTO 2000 (Santa Barbara, CA), 184-196, Lecture Notes in Comput. ...
Evaluation and comparison of clustering algorithms in analyzing ES cell gene expression data. (English summary) Special issue on bioinformatics. Statist. ...
Page 374 of Mathematical Reviews Vol. , Issue Author Index
[page]
Mathematical Reviews
Key recovery and forgery attacks on the MacDES MAC algorithm. (English summary) Advances in cryptology—CRYPTO 2000 (Santa Barbara, CA), 184-196, Lecture Notes in Comput. ...
(Summary) 2002b:41026 41A55 (42A10, 65D32)
— (with Novak, Erich) Spherical product algorithms and the integration of smooth functions with one singular point. (English summary) SJAM J. Numer. ...