Abstract
In this paper, we study the security of randomized CBC-MACs and propose a new construction that resists birthday paradox attacks and provably reaches full security. The size of the MAC tags in this construction is optimal, i.e., exactly twice the size of the block cipher. Up to a constant, the security of the proposed randomized CBC-MAC using an n-bit block cipher is the same as the security of the usual encrypted CBC-MAC using a 2n-bit block cipher. Moreover, this construction adds a negligible computational overhead compared to the cost of a plain, non-randomized CBC-MAC. We give a full standard proof of our construction using one pass of a block-cipher with 2n-bit keys but there also is a proof for n-bit keys block-ciphers in the random oracle model.
Chapter PDF
References
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO’96, volume 1109 of LNCS. Springer, 1996.
M. Bellare, O. Goldreich, and H. Krawczyk. Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier. In CRYPTO’99, volume 1666 of LNCS, pages 270–287. Springer, 1999.
M. Bellare, R. Guerin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In CRYPTO’95, volume 963 of LNCS, pages 15–28. Springer-Verlag, 1995.
M. Bellare, J. Killian, and P. Rogaway. The security of the cipher block chaining message authentication code. In CRYPTO’94, volume 839 of LNCS, pages 341–358. Springer, 1994. See new version at http://www.cs.ucdavis.edu/~rogaway/.
M. Bellare, T. Krovetz, and P. Rogaway. Luby-rackoff backwards: increasing security by making block-ciphers non-invertible. In EUROCRYPT’98, volume 1403 of LNCS, pages 266–280. Springer, 1998.
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In CRYPTO’99, volume 1666 of LNCS, pages 216–233. Springer-Verlag, 1999.
J. Black and P. Rogaway. CBC MACs for arbitrary-length messages: The three-key constructions. In CRYPTO 2000, volume 1880 of LNCS, pages 197–215. Springer, 2000.
C. Hall, D. Wagner, J. Kelsey, and B. Schneier. Building PRFs from PRPs. In CRYPTO’98, volume 1462 of LNCS, pages 370–389. Springer, 1998.
International Organization for Standards, Geneva, Switzerland. ISO/IEC 9797-1. Information Technology-Security Techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm, second edition edition, 1999.
É. Jaulmes, A. Joux, and F. Valette. On the security of randomized cbc-mac beyond the birthday paradox limit: A new construction. Available at http://eprint.iacr.org, 2002. Full version of this paper.
E. Petrank and C. Rackoff. CBC-MAC for real-time data sources. Technical Report 97-10, Dimacs, 1997.
B. Preneel and P. van Oorschot. MDx-MAC and building fast MACs from hash functions. In CRYPTO’95, volume 963 of LNCS, pages 1–14. Springer, 1995.
M. Semanko. L-collision attacks against randomized MACs. In CRYPTO 2000, volume 1880 of LNCS, pages 216–228. Springer, 2000.
U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia. FIPS 113. Computer Data Authentication. Federal Information Processing Standards Publication 113, 1994.
M. Wegman and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265–279, 1981.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jaulmes, É., Joux, A., Valette, F. (2002). On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction. In: Daemen, J., Rijmen, V. (eds) Fast Software Encryption. FSE 2002. Lecture Notes in Computer Science, vol 2365. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45661-9_19
Download citation
DOI: https://doi.org/10.1007/3-540-45661-9_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44009-3
Online ISBN: 978-3-540-45661-2
eBook Packages: Springer Book Archive