Abstract
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, these techniques will work when the MAC calculation involves prefixing the data to be MACed with a ‘length block’. These attack methods provide new (tighter) upper bounds on the level of security offered by the MacDES technique.
Chapter PDF
Similar content being viewed by others
References
B. Bollobás. Random graphs Academic Press, 1985.
K. Brincat and C. J. Mitchell. A taxonomy of CBC-MAC forgery attacks. Submitted, January 2000.
D. Coppersmith and C.J. Mitchell. Attacks on MacDES MAC algorithm. Electronics Letters, 35:1626–1627, 1999.
International Organization for Standardization, Genève, Switzerland. ISO/IEC 9797-1, Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher, December 1999.
L.R. Knudsen. Chosen-text attack on CBC-MAC. Electronics Letters, 33:48–49, 1997.
L.R. Knudsen and B. Preneel. MacDES: MAC algorithm based on DES. Electronics Letters, 34:871–873, 1998.
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography CRC Press, Boca Raton, 1997.
B. Preneel and P.C. van Oorschot. On the security of iterated Message Authentication Codes. IEEE Transactions on Information Theory, 45:188–199, 1999.
J. Spencer. Ten lectures on the probabilistic method Society for Industrial and Applied Mathematics, Philadelphia, PA, second edition, 1994.
P.C. van Oorschot and M.J. Wiener. Parallel collision search with cryptanalytic applications. Journal of Cryptology, 12(1):1–28, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Coppersmith, D., Knudsen, L.R., Mitchell, C.J. (2000). Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. In: Bellare, M. (eds) Advances in Cryptology — CRYPTO 2000. CRYPTO 2000. Lecture Notes in Computer Science, vol 1880. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44598-6_11
Download citation
DOI: https://doi.org/10.1007/3-540-44598-6_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67907-3
Online ISBN: 978-3-540-44598-2
eBook Packages: Springer Book Archive