Skip to main content

Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant

  • Conference paper
Information Security and Privacy (ACISP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4058))

Included in the following conference series:

Abstract

In this paper we discuss the security of PMAC, a provably secue and parallelizable MAC scheme proposed by Black and Rogaway, and Michell’s TMAC variant, proposed to improve the security of TMAC. We show how to devise forgery attacks on PMAC and compare the success rate of our forgery attacks with their security bound. We also present forgery attacks on TMAC variant and show the security of TMAC variant is not improved in the sense of the forgery attack. Furthermore, key recovery attacks on PMAC and TMAC variant are presented in various parameters. Our results imply they have no significant advantage in comparison with other well-established MAC schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brincat, K., Mitchell, C.J.: New CBC-MAC Forgery Attacks. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 3–14. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Black, J., Rogaway, P.: A Block-Cipher Mode of Operation for Parallelizable Message Authentication. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 384–397. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 341–358. Springer, Heidelberg (1994)

    Google Scholar 

  4. Black, J.A., Rogaway, P.: CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 197–215. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. ISO/IEC 9797-1, Information technology – Security techniques – Message Authentication Codes (MACs)– Part 1: Mechanisms using a block cipher, International Organization for Standardization, Geneve, Swizerland (1999)

    Google Scholar 

  6. Iwata, T., Kurosawa, K.: OMAC: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Iwata, T., Kurosawa, K.: On the Security of Two New Omac Variants. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 67–78. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Iwata, T., Kurosawa, K.: Stronger security bounds for OMAC, TMAC, and XCBC. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 402–415. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Jaulmes, É., Joux, A., Valette, F.: On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 237–251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Kohno, T.: Related-Key and Key-Collision Attacks against RMAC, Cryptology ePrint Archive (2002), Available at: http://eprint.iacr.org , Also available at: http://csrc.nist.gov/CryptoToolkit/modes/comments

  11. Kurosawa, K., Iwata, T.: TMAC: Two-Key CBC MAC. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 33–49. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Knudsen, L., Mitchell, C.: Analysis of 3GPP-MAC and two-key 3GPP-MAC. In: Discrete Appiled Mathematics, pp. 181–191. Elsevier Science, Amsterdam (2003)

    Google Scholar 

  13. Knudsen, L., Mitchell, C.: Partial key recovery attack against RMAC. Journal of Cryptology 18(4), 375–389 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  14. Knudsen, L.R., Kohno, T.: Analysis of RMAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 182–191. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Mitchell, C.: On the security of XCBC, TMAC, and OMAC, Technical Report RHCL-MA-2003-4 (August 2003), Available at: http://www.rhul.ac.uk/mathematics/techreports or http://csrc.nist.gov/CryptoToolkit/modes/comments

  16. Mitchell, C.J.: Partial Key Recovery Attacks on XCBC, TMAC and OMAC. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 155–167. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Menezes, A., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boer Raton (1997)

    MATH  Google Scholar 

  18. National Institute of Standards and Technology (NIST), Gaithersburg, MD. NIST Special Publication 800-38B, Draft Recommendation for Block Cipher Modes of Operation: the RMAC Authentication (November 2002)

    Google Scholar 

  19. Petrank, E., Rackoff, C.: CBC MAC real-time data sources. Journal of Cryptology 13(3), 315–348 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  20. Preneel, B., van Oorschot, P.C.: On the security of iterated Message Authentication Codes. IEEE Transactions on Information Theory 45(1), 188–199 (1999)

    Article  MATH  Google Scholar 

  21. Sung, J., Hong, D., Lee, S.: Key Recovery Attacks on the RMAC, TMAC, and IACBC. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 265–273. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, C., Kim, J., Sung, J., Hong, S., Lee, S. (2006). Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant. In: Batten, L.M., Safavi-Naini, R. (eds) Information Security and Privacy. ACISP 2006. Lecture Notes in Computer Science, vol 4058. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11780656_35

Download citation

  • DOI: https://doi.org/10.1007/11780656_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35458-1

  • Online ISBN: 978-3-540-35459-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics