Filters








10 Hits in 2.9 sec

Key Recovery and Forgery Attacks on the MacDES MAC Algorithm [chapter]

Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
2000 Lecture Notes in Computer Science  
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack.  ...  These attack methods provide new (tighter) upper bounds on the level of security offered by the MacDES technique.  ...  We now consider how truncation affects the key recovery and forgery attacks described above. Key recovery attacks The key recovery attacks no longer work as described.  ... 
doi:10.1007/3-540-44598-6_11 fatcat:mry7azpcvrew5c5mtiba2q3gtu

Cryptanalysis of message authentication codes [chapter]

B. Preneel
1998 Lecture Notes in Computer Science  
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery attacks on MACs.  ...  Subsequently an overview is presented of most MAC constructions and on attacks on these algorithms.  ...  Weaknesses of the algorithm The above attacks assume that no shortcuts exist to break the MAC algorithm (either for forgery or for key recovery).  ... 
doi:10.1007/bfb0030408 fatcat:eqqgqfxzfvcdzgk5xuuz5mlzge

Page 6318 of Mathematical Reviews Vol. , Issue 2002H [page]

2002 Mathematical Reviews  
(N-BERG-I; Bergen); Mitchell, Chris J. (4-LNDHB-IS; Egham) Key recovery and forgery attacks on the MacDES MAC algorithm.  ...  Summary: “We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack.  ... 

Batch verifying multiple DSA-type digital signatures

L. Harn
1998 Electronics Letters  
., and YEUNG, M.M.: 'Analysis and synthesis for new digital video applications'. IEEE ICIP Conf.  ...  ., and YEO, B : 'Video visualisation for compact presentation and fast browsing of pictorial content', ZEEE Trans. Circuits Syst.  ...  r 2 T 3 = (gmls:+m2s;fm3s~yrls;+Tzsafr3sb mod p ) mod Lim and Lee's attack: Based on Lim and Lee's attack, any attacker can easily forge signatures to satisfy the batch verification criterion without knowing  ... 
doi:10.1049/el:19980620 fatcat:pm6kwsatarhaffzjijwelrj3gm

Page 2294 of Mathematical Reviews Vol. , Issue 2002C [page]

2002 Mathematical Reviews  
Knudsen and Chris J. Mitchell, Key recovery and forgery attacks on the MacDES MAC algorithm (184-196).  ...  John Black and Phillip Rogaway, CBC MACs for arbitrary- length messages: the three-key constructions (197-215); Michael Semanko, L-collision attacks against randomized MACs (216 228); Jean-Sébastien Coron  ... 

Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs [chapter]

Tetsu Iwata, Lei Wang
2015 Lecture Notes in Computer Science  
ISO/IEC 9797-1:2011 illustrates a total of ten CBC MACs, where one of these MACs, the basic CBC MAC, is widely known to be insecure.  ...  We first show attacks against five MACs by taking advantage of the knowledge of the key check value. We then prove that the analysis is tight, in a concrete security paradigm.  ...  We note that there are other attacks for all these MACs, e.g., a key recovery attack. See [15] and [29] for more details.  ... 
doi:10.1007/978-3-662-46706-0_16 fatcat:5puswlk3fndlrlafxpxkyklmv4

On the Security of Double and 2-Key Triple Modes of Operation [chapter]

Helena Handschuh, Bart Preneel
1999 Lecture Notes in Computer Science  
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively).  ...  It also presents an improved attack on multiple modes that contain an OFB mode and discusses practical solutions that take into account realistic constraints.  ...  We leave it as an open problem to improve the attacks on the schemes listed in Table 2 .  ... 
doi:10.1007/3-540-48519-8_16 fatcat:cuhyuywwnvftnnfsrkqrmoupbu

Page 2768 of Mathematical Reviews Vol. , Issue Subject Index [page]

Mathematical Reviews  
Key recovery and forgery attacks on the MacDES MAC algorithm. (English summary) 2002h:94076 — Weakness in quaternion signatures.  ...  [Security in payment systems on the basis of digital money] 2002f:94050 Ng, Siaw-Lynn (with Walker, Michael) On the composition of matroids and ideal secret sharing schemes.  ... 

Page 994 of Mathematical Reviews Vol. , Issue Author Index [page]

Mathematical Reviews  
Key recovery and forgery attacks on the MacDES MAC algorithm. (English summary) Advances in cryptology—CRYPTO 2000 (Santa Barbara, CA), 184-196, Lecture Notes in Comput.  ...  Evaluation and comparison of clustering algorithms in analyzing ES cell gene expression data. (English summary) Special issue on bioinformatics. Statist.  ... 

Page 374 of Mathematical Reviews Vol. , Issue Author Index [page]

Mathematical Reviews  
Key recovery and forgery attacks on the MacDES MAC algorithm. (English summary) Advances in cryptology—CRYPTO 2000 (Santa Barbara, CA), 184-196, Lecture Notes in Comput.  ...  (Summary) 2002b:41026 41A55 (42A10, 65D32) — (with Novak, Erich) Spherical product algorithms and the integration of smooth functions with one singular point. (English summary) SJAM J. Numer.  ...