메뉴 건너뛰기




Volumn 8, Issue 5, 1997, Pages 455-470

Security Analysis of the Message Authenticator Algorithm (MAA)

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; STANDARDS;

EID: 0031223633     PISSN: 1124318X     EISSN: None     Source Type: Journal    
DOI: 10.1002/ett.4460080504     Document Type: Article
Times cited : (11)

References (32)
  • 3
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • LNCS Springer-Verlag
    • M. Bellare, J. Kilian, P. Rogaway: The security of cipher block chaining. Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, p. 341-358.
    • (1994) Proc. Crypto'94 , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 4
    • 84954417747 scopus 로고
    • XOR MACs: New methods for message authentication using block ciphers
    • LNCS 963, Springer-Verlag
    • M. Bellare, R. Guérin, P. Rogaway: XOR MACs: new methods for message authentication using block ciphers. Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, p. 15-28.
    • (1995) Proc. Crypto'95 , pp. 15-28
    • Bellare, M.1    Guérin, R.2    Rogaway, P.3
  • 6
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • LNCS Springer-Verlag
    • M. Bellare, R. Canetti, H. Krawczyk: Keying hash functions for message authentication. Proc. Crypto'96, LNCS 1109, Springer-Verlag, 1996, p. 1-15. Full version: http:// www.research.ibm.com/security/.
    • (1996) Proc. Crypto'96 , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 8
    • 0346810272 scopus 로고
    • File authentication: A rule for constructing algorithms
    • October 12
    • H. Block: File authentication: A rule for constructing algorithms. SÄKdata Report, October 12, 1983.
    • (1983) SÄKdata Report
    • Block, H.1
  • 9
    • 0004794568 scopus 로고    scopus 로고
    • The RIPEMD-160 cryptographic hash function
    • January
    • A. Bosselaers, H. Dobbertin, B. Preneel: The RIPEMD-160 cryptographic hash function. "Dr. Dobb's Journal", Vol. 22, No. 1, January 1997, p. 24-28.
    • (1997) Dr. Dobb's Journal , vol.22 , Issue.1 , pp. 24-28
    • Bosselaers, A.1    Dobbertin, H.2    Preneel, B.3
  • 10
    • 84985785183 scopus 로고
    • A message authenticator algorithm suitable for a mainframe computer
    • LNCS Springer-Verlag
    • D. Davies: A message authenticator algorithm suitable for a mainframe computer. Proc. Crypto'84, LNCS 196, Springer-Verlag, 1985, p. 393-400.
    • (1985) Proc. Crypto'84 , vol.196 , pp. 393-400
    • Davies, D.1
  • 11
    • 78649262413 scopus 로고
    • The message authenticator algorithm (MAA) and its implementation
    • Feb.
    • D. Davies, D.O. Clayden: The message authenticator algorithm (MAA) and its implementation. NPL Report DITC 109/88, Feb. 1988.
    • (1988) NPL Report DITC , vol.109 , Issue.88
    • Davies, D.1    Clayden, D.O.2
  • 14
    • 0003508568 scopus 로고
    • NBS, U.S. Department of Commerce, Washington D.C., Jan.
    • FIPS 46: Data encryption standard. NBS, U.S. Department of Commerce, Washington D.C., Jan. 1977.
    • (1977) Data Encryption Standard
  • 15
    • 0003629991 scopus 로고
    • NIST, US Department of Commerce, Washington D.C., April
    • FIPS 180-1: Secure hash standard. NIST, US Department of Commerce, Washington D.C., April 1995.
    • (1995) Secure Hash Standard.
  • 18
    • 84878363139 scopus 로고
    • On the relation between A-codes and codes correcting independent errors
    • LNCS 765, Springer-Verlag
    • T. Johansson, G. Kabatianskii, B. Smeets: On the relation between A-codes and codes correcting independent errors. Proc. Eurocrypt'93, LNCS 765, Springer-Verlag, 1994, p. 1-11.
    • (1994) Proc. Eurocrypt'93 , pp. 1-11
    • Johansson, T.1    Kabatianskii, G.2    Smeets, B.3
  • 19
    • 84942522751 scopus 로고    scopus 로고
    • MMH: Software message authentication in the Gbit/s rates
    • LNCS, Springer-Verlag
    • S. Halevi, H. Krawczyk: MMH: software message authentication in the Gbit/s rates. Fast Software Encryption 1997, LNCS, 1267, Springer-Verlag, 1997, p. 172-189.
    • (1997) Fast Software Encryption 1997 , vol.1267 , pp. 172-189
    • Halevi, S.1    Krawczyk, H.2
  • 20
    • 0031546278 scopus 로고    scopus 로고
    • A new chosen-text attack on CBC-MAC
    • January
    • L. R. Knudsen: A new chosen-text attack on CBC-MAC. "Electronics Letters", Vol. 33, No. 1, January 1997, p. 48-49.
    • (1997) Electronics Letters , vol.33 , Issue.1 , pp. 48-49
    • Knudsen, L.R.1
  • 21
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • LNCS Springer-Verlag
    • H. Krawczyk: LFSR-based hashing and authentication. Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, p. 129-139.
    • (1994) Proc. Crypto'94 , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 22
    • 85028910917 scopus 로고
    • Markov ciphers and differential cryptanalysis
    • LNCS Springer-Verlag
    • X. Lai, J. L. Massey, S. Murphy: Markov ciphers and differential cryptanalysis. Proc. Eurocrypt'91, LNCS 547, Springer-Verlag, 1991, p. 17-38.
    • (1991) Proc. Eurocrypt'91 , vol.547 , pp. 17-38
    • Lai, X.1    Massey, J.L.2    Murphy, S.3
  • 23
    • 85028754650 scopus 로고
    • The first experimental cryptanalysis of the Data Encryption Standard
    • LNCS Springer-Verlag
    • M. Matsui: The first experimental cryptanalysis of the Data Encryption Standard. Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, p. 1-11.
    • (1994) Proc. Crypto'94 , vol.839 , pp. 1-11
    • Matsui, M.1
  • 24
    • 51549120471 scopus 로고
    • MDx-MAC and building fast MACs from hash functions
    • LNCS Springer-Verlag
    • B. Preneel, P. C. van Oorschot: MDx-MAC and building fast MACs from hash functions. Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, p. 1-14.
    • (1995) Proc. Crypto'95 , vol.963 , pp. 1-14
    • Preneel, B.1    Van Oorschot, P.C.2
  • 25
    • 85088200017 scopus 로고    scopus 로고
    • On the security of two MAC algorithms
    • LNCS Springer-Verlag
    • B. Preneel, P.C. van Oorschot: On the security of two MAC algorithms. Proc. Eurocrypt'96, LNCS 1070, Springer-Verlag, 1996, p. 19-32.
    • (1996) Proc. Eurocrypt'96 , vol.1070 , pp. 19-32
    • Preneel, B.1    Van Oorschot, P.C.2
  • 26
    • 0030216031 scopus 로고    scopus 로고
    • A key recovery attack on the ANSI X9.19 retail MAC
    • B. Preneel, P. C. van Oorschot: A key recovery attack on the ANSI X9.19 retail MAC. "Electronics Letters", Vol. 32, No. 17, 1996, p. 1568-1569.
    • (1996) Electronics Letters , vol.32 , Issue.17 , pp. 1568-1569
    • Preneel, B.1    Van Oorschot, P.C.2
  • 28
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • LNCS Springer-Verlag
    • P. Rogaway: Bucket hashing and its application to fast message authentication. Proc. Crypto'95, LNCS 963, Springer-Verlag, 1995, p. 29-42.
    • (1995) Proc. Crypto'95 , vol.963 , pp. 29-42
    • Rogaway, P.1
  • 30
    • 85016817758 scopus 로고
    • Cryptographic significance of the carry for ciphers based on integer addition
    • LNCS Springer-Verlag
    • O. Staffelbach, W. Meier: Cryptographic significance of the carry for ciphers based on integer addition. Proc. Crypto'90, LNCS 537, Springer-Verlag, 1991, p. 601-615.
    • (1991) Proc. Crypto'90 , vol.537 , pp. 601-615
    • Staffelbach, O.1    Meier, W.2
  • 31
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman, J. L. Carter: New hash functions and their use in authentication and set equality. "J. Computer Sys. Sciences", Vol. 22, No. 3, 1981, p. 265-279.
    • (1981) J. Computer Sys. Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 32
    • 1842531284 scopus 로고
    • Efficient des key search
    • School of Computer Science, Carleton University, Ottawa, Canada, May Presented at the rump session of Crypto'93
    • M. J. Wiener: Efficient DES key search. Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. Presented at the rump session of Crypto'93.
    • (1994) Technical Report TR-244
    • Wiener, M.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.