Analysis of indirect message injection for MAC generation using stream ciphers
Contribuinte(s) |
Susilo, Willy Mu, Yi Seberry, Jennifer |
---|---|
Data(s) |
01/07/2012
|
Resumo |
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer |
Relação |
http://eprints.qut.edu.au/54723/1/ACISP2012.pdf DOI:10.1007/978-3-642-31448-3_11 ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151. |
Direitos |
Copyright 2012 Springer |
Fonte |
Information Security Institute; Science & Engineering Faculty |
Palavras-Chave | #080400 DATA FORMAT #MAC #Stream ciphers #Forgery attacks #Grain-128a #Sfinks #128-EIA3 |
Tipo |
Conference Paper |