Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited

  • Liting Zhang
  • Wenling Wu
  • Peng Wang
  • Lei Zhang
  • Shuang Wu
  • Bo Liang
Conference paper

DOI: 10.1007/978-3-642-13858-4_14

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6147)
Cite this paper as:
Zhang L., Wu W., Wang P., Zhang L., Wu S., Liang B. (2010) Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. In: Hong S., Iwata T. (eds) Fast Software Encryption. FSE 2010. Lecture Notes in Computer Science, vol 6147. Springer, Berlin, Heidelberg

Abstract

Almost all current block-cipher-based MACs reduce their security to the pseudorandomness of their underlying block ciphers, except for a few of them to the unpredictability, a strictly weaker security notion than pseudorandomness. However, the latter MACs offer relatively low efficiency. In this paper, we investigate the feasibility of constructing rate-1 MACs from related-key unpredictable block ciphers. First, we show all the existing rate-1 MACs are insecure when instantiated with a special kind of related-key unpredictable block cipher. The attacks on them inspire us to propose an assumption that all the chaining values are available to adversaries for theoretically analyzing such MACs. Under this assumption, we study the security of 64 rate-1 MACs in keyed PGV model, and find that 1) 15 MACs are meaningless; 2) 25 MACs are vulnerable to three kinds of attacks respectively and 3) 24 MACs are provably secure when their underlying block ciphers are related-key unpredictable. Furthermore, we refine these 24 provably secure rate-1 MACs in Compact PGV model by removing a useless parameter away, and find that the resulting 6 provably secure MACs are in fact equivalent to each other. In the aspect of efficiency, however, the low rate of these secure MACs does not necessarily mean they can run faster than none rate-1 one MACs, due to their large number of key schedules.

Keywords

Message Authentication Code Block Cipher Mode of Operation Provable Security 
Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Liting Zhang
    • 1
    • 2
  • Wenling Wu
    • 1
    • 2
  • Peng Wang
    • 1
    • 2
  • Lei Zhang
    • 1
    • 2
  • Shuang Wu
    • 1
    • 2
  • Bo Liang
    • 1
    • 2
  1. 1.State Key Laboratory of Information SecurityInstitute of Software, Chinese Academy of SciencesBeijingP.R. China
  2. 2.Graduate University of Chinese Academy of SciencesBeijingP.R. China

Personalised recommendations