메뉴 건너뛰기




Volumn 45, Issue 1, 1999, Pages 188-199

On the security of iterated message authentication codes

Author keywords

Collisions; Cryptanalysis; Data authentication; Hash functions; Message authentication codes

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; ITERATIVE METHODS; SECURITY OF DATA;

EID: 0032665874     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/18.746787     Document Type: Article
Times cited : (77)

References (52)
  • 4
    • 84955586754 scopus 로고    scopus 로고
    • "Universal hashing and multiple authentication," in
    • 96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitz, Ed. New York: SpringerVerlag, 1996, pp. 16-30.
    • M. Atici and D. Stinson, "Universal hashing and multiple authentication," in Advances in Cryptology, Proc. Crypto'96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitz, Ed. New York: SpringerVerlag, 1996, pp. 16-30.
    • Advances in Cryptology, Proc. Crypto'
    • Atici, M.1    Stinson, D.2
  • 5
    • 84983089516 scopus 로고    scopus 로고
    • J. Kilian, and P. R. Rogaway, "The security of cipher block chaining," in
    • 94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 341-358.
    • M. Bellare, J. Kilian, and P. R. Rogaway, "The security of cipher block chaining," in Advances in Cryptology, Proc. Crypto'94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 341-358.
    • Advances in Cryptology, Proc. Crypto'
    • Bellare, M.1
  • 6
    • 84954417747 scopus 로고    scopus 로고
    • R. Guérin, and P. R. Rogaway, "XOR MAC's: New methods for message authentication using block ciphers," in
    • 95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlag, 1995, pp. 15-28.
    • M. Bellare, R. Guérin, and P. R. Rogaway, "XOR MAC's: New methods for message authentication using block ciphers," in Advances in Cryptology, Proc. Crypto'95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlag, 1995, pp. 15-28.
    • Advances in Cryptology, Proc. Crypto'
    • Bellare, M.1
  • 7
    • 0030416137 scopus 로고    scopus 로고
    • R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," in
    • 37th Annu. Symp. Foundations of Computer Science. Los Alamitos, ÇA: IEEE Comp. Soc. Press, 1996, pp. 514-523. [Online]. Full version available WWW: http://www-cse.ucsd.edu/users/mihir.
    • M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," in Proc. 37th Annu. Symp. Foundations of Computer Science. Los Alamitos, ÇA: IEEE Comp. Soc. Press, 1996, pp. 514-523. [Online]. Full version available WWW: http://www-cse.ucsd.edu/users/mihir.
    • Proc.
    • Bellare, M.1
  • 8
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication," in
    • 96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitx, Ed. New York: Springer-Verlag, 1996, pp. 1-15. [Online]. Full version available WWW: http:// www.research. ibm.com/security/.
    • Keying hash functions for message authentication," in Advances in Cryptology, Proc. Crypto '96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitx, Ed. New York: Springer-Verlag, 1996, pp. 1-15. [Online]. Full version available WWW: http:// www.research. ibm.com/security/.
    • Advances in Cryptology, Proc. Crypto '
  • 9
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication,"
    • 2104, Internet Activities Board, Internet Privacy Task Force, Feb. 1997.
    • HMAC: Keyed-hashing for message authentication," Request for Comments (RFC) 2104, Internet Activities Board, Internet Privacy Task Force, Feb. 1997.
    • Request for Comments (RFC)
  • 11
    • 27544455677 scopus 로고    scopus 로고
    • "A cryptographic checksum for integrity protection,"
    • vol. 6, no. 5, pp. 505-510, 1987.
    • F. Cohen, "A cryptographic checksum for integrity protection," Comput. Security, vol. 6, no. 5, pp. 505-510, 1987.
    • Comput. Security
    • Cohen, F.1
  • 12
    • 84981199109 scopus 로고    scopus 로고
    • "A design principle for hash functions," in
    • 89, Lecture Notes in Computer Science, Vol. 435, G. Brassard, Ed. New York: Springer-Verlag, 1990, pp. 416-427.
    • I. B. Damgârd, "A design principle for hash functions," in Advances in Cryptology, Proc. Crypto'89, Lecture Notes in Computer Science, Vol. 435, G. Brassard, Ed. New York: Springer-Verlag, 1990, pp. 416-427.
    • Advances in Cryptology, Proc. Crypto'
    • Damgârd, I.B.1
  • 13
    • 84985785183 scopus 로고    scopus 로고
    • "A message authenticator algorithm suitable for a mainframe computer," in
    • 84, Lecture Notes in Computer Science, Vol. 196, G. R. Blakley and D. Chaum, Eds. New York: Springer-Verlag, 1985, pp. 393-400.
    • D. Davies, "A message authenticator algorithm suitable for a mainframe computer," in Advances in Cryptology, Proc. Crypto'84, Lecture Notes in Computer Science, Vol. 196, G. R. Blakley and D. Chaum, Eds. New York: Springer-Verlag, 1985, pp. 393-400.
    • Advances in Cryptology, Proc. Crypto'
    • Davies, D.1
  • 16
    • 85029523925 scopus 로고    scopus 로고
    • "An attack on the last two rounds of MD4," in
    • 91, Lecture Notes in Computer Science, Vol. 576, 3. Feigenbaum, Ed. New York: Springer-Verlag, 1992, pp. 194-203.
    • B. den Boer and A. Bosselaers, "An attack on the last two rounds of MD4," in Advances in Cryptology, Proc. Crypto'91, Lecture Notes in Computer Science, Vol. 576, 3. Feigenbaum, Ed. New York: Springer-Verlag, 1992, pp. 194-203.
    • Advances in Cryptology, Proc. Crypto'
    • Den Boer, B.1    Bosselaers, A.2
  • 17
    • 84985796089 scopus 로고    scopus 로고
    • Collisions for the compression function of MD5," in
    • 93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 293-304.
    • Collisions for the compression function of MD5," in Advances in Cryptology, Proc. Eurocrypt'93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 293-304.
    • Advances in Cryptology, Proc. Eurocrypt'
  • 19
    • 0348175848 scopus 로고    scopus 로고
    • RIPEMD with two-round compress function is not collisionfree,"
    • vol. 10, no. 1, pp. 51-69, Winter 1997.
    • RIPEMD with two-round compress function is not collisionfree," J. Cryptol, vol. 10, no. 1, pp. 51-69, Winter 1997.
    • J. Cryptol
  • 20
    • 84958957924 scopus 로고    scopus 로고
    • A. Bosselaers, and B. Preneel, "RIPEMD-160: A strengthened version of RIPEMD," in
    • Vol. 1039, D. Gollmann, Ed. New York: Springer-Verlag, 1996, pp. 71-82.
    • H. Dobbertin, A. Bosselaers, and B. Preneel, "RIPEMD-160: A strengthened version of RIPEMD," in Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1039, D. Gollmann, Ed. New York: Springer-Verlag, 1996, pp. 71-82.
    • Fast Software Encryption, Lecture Notes in Computer Science
    • Dobbertin, H.1
  • 25
    • 33747243362 scopus 로고    scopus 로고
    • 3.0," Internet Draft (work in progress), Internet Activities Board, Internet Privacy Task Force, Mar. 1996.
    • A. O. Freier, P. Karlton, and P. C. Kocher, "The SSL protocol version 3.0," Internet Draft (work in progress), Internet Activities Board, Internet Privacy Task Force, Mar. 1996.
    • P. Karlton, and P. C. Kocher, "The SSL protocol version
    • Freier, A.O.1
  • 27
    • 0005385598 scopus 로고    scopus 로고
    • R. Cohen, and M. Campana, "A generalized birthday attack," in
    • 88, Lecture Notes in Computer Science, Vol. 330, C. G. Günther, Ed. New York: SpringerVerlag, 1988, pp. 129-156.
    • M. Girault, R. Cohen, and M. Campana, "A generalized birthday attack," in Advances in Cryptology, Proc. Eurocrypt '88, Lecture Notes in Computer Science, Vol. 330, C. G. Günther, Ed. New York: SpringerVerlag, 1988, pp. 129-156.
    • Advances in Cryptology, Proc. Eurocrypt '
    • Girault, M.1
  • 30
    • 84878363139 scopus 로고    scopus 로고
    • G. Kabatianskii, and B. Smeets, "On the relation between A-codes and codes correcting independent errors," in
    • 93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
    • T. Johansson, G. Kabatianskii, and B. Smeets, "On the relation between A-codes and codes correcting independent errors," in Advances in Cryptology, Proc. Eurocrypt'93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
    • Advances in Cryptology, Proc. Eurocrypt'
    • Johansson, T.1
  • 31
    • 0020923149 scopus 로고    scopus 로고
    • S. M. Matyas, and C. H. Meyer, "Message authentication with manipulation detection codes," in
    • 1983 IEEE Symp. Security and Privacy. Los Alamitos, CA: IEEE Comp. Soc. Press, 1983, pp. 33-54.
    • R. R. Jueneman, S. M. Matyas, and C. H. Meyer, "Message authentication with manipulation detection codes," in Proc. 1983 IEEE Symp. Security and Privacy. Los Alamitos, CA: IEEE Comp. Soc. Press, 1983, pp. 33-54.
    • Proc.
    • Jueneman, R.R.1
  • 33
    • 0031546278 scopus 로고    scopus 로고
    • "A chosen text attack on CBC-MAC,"
    • vol. 33, no. 1, pp. 48_49, 1997.
    • L. R. Knudsen, "A chosen text attack on CBC-MAC," Electron. Lett., vol. 33, no. 1, pp. 48_49, 1997.
    • Electron. Lett.
    • Knudsen, L.R.1
  • 34
    • 84991939136 scopus 로고    scopus 로고
    • "LFSR-based hashing and authentication," in
    • 94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 129-139.
    • H. Krawczyk, "LFSR-based hashing and authentication," in Advances in Cryptology, Proc. Cryto'94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 129-139.
    • Advances in Cryptology, Proc. Cryto'
    • Krawczyk, H.1
  • 35
    • 33747246246 scopus 로고    scopus 로고
    • 5 GSS-API mechanism," Request for Comments (RFC) 1964, Internet Activities Board, Internet Privacy Task Force, June 1996.
    • J. Linn, "The Kerberos version 5 GSS-API mechanism," Request for Comments (RFC) 1964, Internet Activities Board, Internet Privacy Task Force, June 1996.
    • "The Kerberos version
    • Linn, J.1
  • 36
    • 33747285760 scopus 로고    scopus 로고
    • "A new method for known plaintext attack of FEAL cipher," in
    • 92, Lecture Notes in Computer Science, Vol. 658, R. A. Rueppel, Ed. New York: SpringerVerlag, 1993, pp. 81-91.
    • M. Matsui, "A new method for known plaintext attack of FEAL cipher," in Advances in Cryptology, Proc. Eurocrypt'92, Lecture Notes in Computer Science, Vol. 658, R. A. Rueppel, Ed. New York: SpringerVerlag, 1993, pp. 81-91.
    • Advances in Cryptology, Proc. Eurocrypt'
    • Matsui, M.1
  • 37
    • 85028754650 scopus 로고    scopus 로고
    • The first experimental cryptanalysis of the data encryption standard," in
    • 94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
    • The first experimental cryptanalysis of the data encryption standard," in Advances in Cryptology, Proc. Cryto'94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
    • Advances in Cryptology, Proc. Cryto'
  • 38
    • 0042026935 scopus 로고    scopus 로고
    • 5," Request for Comments (RFC) 1828, Internet Activities Board, Internet Privacy Task Force, Aug. 1995.
    • P. Metzger and W. Simpson, "IP authentication using keyed MD5," Request for Comments (RFC) 1828, Internet Activities Board, Internet Privacy Task Force, Aug. 1995.
    • "IP authentication using keyed MD
    • Metzger, P.1    Simpson, W.2
  • 39
    • 50849147684 scopus 로고    scopus 로고
    • "Solutions to the multidestination secure electronic mail problem," in
    • vol. 7, no. 5, pp. 483_488, 1988.
    • C. Mitchell and M. Walker, "Solutions to the multidestination secure electronic mail problem," in Comput. Security, vol. 7, no. 5, pp. 483_488, 1988.
    • Comput. Security
    • Mitchell, C.1    Walker, M.2
  • 40
    • 33747277698 scopus 로고    scopus 로고
    • "Analysis and design of cryptographic hash functions," Katholieke Universiteit Leuven, Belgium, Doctoral dissertation, Jan. 1993 updated version to be published as
    • B. Preneel, "Analysis and design of cryptographic hash functions," Katholieke Universiteit Leuven, Belgium, Doctoral dissertation, Jan. 1993 (updated version to be published as Cryptographic Hash Functions. Boston, MA: Kluwer).
    • Cryptographic Hash Functions. Boston, MA: Kluwer.
    • Preneel, B.1
  • 41
    • 51549120471 scopus 로고    scopus 로고
    • "MDx-MAC and building fast MAC's from hash functions," in
    • 95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 1-14.
    • B. Preneel and P. C. van Oorschot, "MDx-MAC and building fast MAC's from hash functions," in Advances in Cryptology, Proc. Crypto'95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 1-14.
    • Advances in Cryptology, Proc. Crypto'
    • Preneel, B.1    Van Oorschot, P.C.2
  • 42
    • 33747272934 scopus 로고    scopus 로고
    • On the security of two MAC algorithms," in
    • 96, Lecture Notes in Computer Science, Vol. 1070, U. Maurer, Ed. New York: Springer-Verlag, 1996, pp. 19-32.
    • On the security of two MAC algorithms," in Advances in Cryptology, Proc. Eurocrypt'96, Lecture Notes in Computer Science, Vol. 1070, U. Maurer, Ed. New York: Springer-Verlag, 1996, pp. 19-32.
    • Advances in Cryptology, Proc. Eurocrypt'
  • 43
    • 0030216031 scopus 로고    scopus 로고
    • A key recovery attack on the ANSI X9.19 retail MAC,"
    • vol. 32, no. 17, pp. 1568-1569, 1996.
    • A key recovery attack on the ANSI X9.19 retail MAC," Electron. Lett., vol. 32, no. 17, pp. 1568-1569, 1996.
    • Electron. Lett.
  • 44
    • 0031223633 scopus 로고    scopus 로고
    • V. Rijmen, and P. C. van Oorschot, "A security analysis of the message authenticator algorithm (MAA),"
    • vol. 8, no. 5, pp. 455_470, 1997.
    • B. Preneel, V. Rijmen, and P. C. van Oorschot, "A security analysis of the message authenticator algorithm (MAA)," Europ. Trans. Telecommun., vol. 8, no. 5, pp. 455_470, 1997.
    • Europ. Trans. Telecommun.
    • Preneel, B.1
  • 46
    • 78650922644 scopus 로고    scopus 로고
    • "The MD4 message digest algorithm," in
    • 90, Lecture Notes in Computer Science, Vol. 537, S. Vanstone, Ed. New York: Springer-Verlag, 1991, pp. 303-311.
    • R. L. Rivest, "The MD4 message digest algorithm," in Advances in Cryptology, Proc. Crypto'90, Lecture Notes in Computer Science, Vol. 537, S. Vanstone, Ed. New York: Springer-Verlag, 1991, pp. 303-311.
    • Advances in Cryptology, Proc. Crypto'
    • Rivest, R.L.1
  • 48
    • 84957645558 scopus 로고    scopus 로고
    • "Bucket hashing and its application to fast message authentication," in
    • 95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 29_412.
    • P. R. Rogaway, "Bucket hashing and its application to fast message authentication," in Advances in Cryptology, Proc. Crypto'95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 29_412.
    • Advances in Cryptology, Proc. Crypto'
    • Rogaway, P.R.1
  • 49
    • 0347506735 scopus 로고    scopus 로고
    • "Message authentication with one-way hash functions,"
    • vol. 22, no. 5, pp. 29-38, 1992.
    • G. Tsudik, "Message authentication with one-way hash functions," ACM Comput. Commun. Rev., vol. 22, no. 5, pp. 29-38, 1992.
    • ACM Comput. Commun. Rev.
    • Tsudik, G.1
  • 50
    • 84948973102 scopus 로고    scopus 로고
    • "On the need for multipermutations: Cryptanalysis of MD4 and SAFER," in
    • Vol. 1008, B. Preneel, Ed. New York: Springer-Verlag, 1995, pp. 286-297.
    • S. Vaudenay, "On the need for multipermutations: Cryptanalysis of MD4 and SAFER," in Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1008, B. Preneel, Ed. New York: Springer-Verlag, 1995, pp. 286-297.
    • Fast Software Encryption, Lecture Notes in Computer Science
    • Vaudenay, S.1
  • 51
    • 0019572642 scopus 로고    scopus 로고
    • "New hash functions and their use in authentication and set equality,"
    • vol. 22, no. 3, pp. 265-279, 1981.
    • M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Sys. Sci., vol. 22, no. 3, pp. 265-279, 1981.
    • J. Comput. Sys. Sci.
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.