Abstract
In this paper we discuss the security of PMAC, a provably secue and parallelizable MAC scheme proposed by Black and Rogaway, and Michell’s TMAC variant, proposed to improve the security of TMAC. We show how to devise forgery attacks on PMAC and compare the success rate of our forgery attacks with their security bound. We also present forgery attacks on TMAC variant and show the security of TMAC variant is not improved in the sense of the forgery attack. Furthermore, key recovery attacks on PMAC and TMAC variant are presented in various parameters. Our results imply they have no significant advantage in comparison with other well-established MAC schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Brincat, K., Mitchell, C.J.: New CBC-MAC Forgery Attacks. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 3–14. Springer, Heidelberg (2001)
Black, J., Rogaway, P.: A Block-Cipher Mode of Operation for Parallelizable Message Authentication. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 384–397. Springer, Heidelberg (2002)
Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 341–358. Springer, Heidelberg (1994)
Black, J.A., Rogaway, P.: CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 197–215. Springer, Heidelberg (2000)
ISO/IEC 9797-1, Information technology – Security techniques – Message Authentication Codes (MACs)– Part 1: Mechanisms using a block cipher, International Organization for Standardization, Geneve, Swizerland (1999)
Iwata, T., Kurosawa, K.: OMAC: One-Key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)
Iwata, T., Kurosawa, K.: On the Security of Two New Omac Variants. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 67–78. Springer, Heidelberg (2004)
Iwata, T., Kurosawa, K.: Stronger security bounds for OMAC, TMAC, and XCBC. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 402–415. Springer, Heidelberg (2003)
Jaulmes, É., Joux, A., Valette, F.: On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 237–251. Springer, Heidelberg (2002)
Kohno, T.: Related-Key and Key-Collision Attacks against RMAC, Cryptology ePrint Archive (2002), Available at: http://eprint.iacr.org , Also available at: http://csrc.nist.gov/CryptoToolkit/modes/comments
Kurosawa, K., Iwata, T.: TMAC: Two-Key CBC MAC. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 33–49. Springer, Heidelberg (2003)
Knudsen, L., Mitchell, C.: Analysis of 3GPP-MAC and two-key 3GPP-MAC. In: Discrete Appiled Mathematics, pp. 181–191. Elsevier Science, Amsterdam (2003)
Knudsen, L., Mitchell, C.: Partial key recovery attack against RMAC. Journal of Cryptology 18(4), 375–389 (2005)
Knudsen, L.R., Kohno, T.: Analysis of RMAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 182–191. Springer, Heidelberg (2003)
Mitchell, C.: On the security of XCBC, TMAC, and OMAC, Technical Report RHCL-MA-2003-4 (August 2003), Available at: http://www.rhul.ac.uk/mathematics/techreports or http://csrc.nist.gov/CryptoToolkit/modes/comments
Mitchell, C.J.: Partial Key Recovery Attacks on XCBC, TMAC and OMAC. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 155–167. Springer, Heidelberg (2005)
Menezes, A., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boer Raton (1997)
National Institute of Standards and Technology (NIST), Gaithersburg, MD. NIST Special Publication 800-38B, Draft Recommendation for Block Cipher Modes of Operation: the RMAC Authentication (November 2002)
Petrank, E., Rackoff, C.: CBC MAC real-time data sources. Journal of Cryptology 13(3), 315–348 (2000)
Preneel, B., van Oorschot, P.C.: On the security of iterated Message Authentication Codes. IEEE Transactions on Information Theory 45(1), 188–199 (1999)
Sung, J., Hong, D., Lee, S.: Key Recovery Attacks on the RMAC, TMAC, and IACBC. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 265–273. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, C., Kim, J., Sung, J., Hong, S., Lee, S. (2006). Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant. In: Batten, L.M., Safavi-Naini, R. (eds) Information Security and Privacy. ACISP 2006. Lecture Notes in Computer Science, vol 4058. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11780656_35
Download citation
DOI: https://doi.org/10.1007/11780656_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35458-1
Online ISBN: 978-3-540-35459-8
eBook Packages: Computer ScienceComputer Science (R0)