Abstract
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
AlMashrafi, M., Bartlett, H., Simpson, L., Dawson, E., Wong, K.K.-H.: Analysis of indirect message injection for MAC generation using stream ciphers. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 138–151. Springer, Heidelberg (2012)
Hawkes, P., Paddon, M., Rose, G.G.: Primitive specification for SOBER-128. IACR ePrint Archive, 473:476 (2003), http://eprint.iacr.org/2003/81
Hawkes, P., Paddon, M., Rose, G.G., de Vries, M.W.: Primitive Specification for SSS
Hawkes, P., Paddon, M., Rose, G.G., de Vries, M.W.: Primitive Specification for NLSv2. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/036 (2006), http://www.ecrypt.eu.org/stream
Lidl, R., Niederreiter, H.: Finite fields. Encyclopedia of Mathematics and its Applications, vol. 20. Cambridge University Press (1997)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1997)
Nakano, Y., Cid, C., Fukushima, K., Kiyomoto, S.: Analysis of Message Injection in Stream Cipher-Based Hash Functions. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 498–513. Springer, Heidelberg (2011)
Wardlaw, W.P.: A matrix model for the linear feedback shift register. Dtic Document, Naval Research Lab, Washington, DC (1989)
Watanabe, D., Furuya, S.: A MAC forgery attack on SOBER-128. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 472–482. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bartlett, H., AlMashrafi, M., Simpson, L., Dawson, E., Wong, K.KH. (2013). A General Model for MAC Generation Using Direct Injection. In: Kutyłowski, M., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2012. Lecture Notes in Computer Science, vol 7763. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38519-3_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-38519-3_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38518-6
Online ISBN: 978-3-642-38519-3
eBook Packages: Computer ScienceComputer Science (R0)