메뉴 건너뛰기




Volumn 7549 LNCS, Issue , 2012, Pages 216-225

Cycling attacks on GCM, GHASH and other polynomial MACs and hashes

Author keywords

AES GCM; Cryptanalysis; Cycling Attacks; Galois Counter Mode; Weak Keys

Indexed keywords

AES-GCM; CRYPTANALYSIS; CYCLING ATTACKS; GALOIS/COUNTER MODE; WEAK KEY;

EID: 84866719036     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34047-5_13     Document Type: Conference Paper
Times cited : (45)

References (20)
  • 1
    • 0012983374 scopus 로고    scopus 로고
    • Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC
    • NIST
    • NIST: Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC. NIST Special Publication 800-38D (2007)
    • (2007) NIST Special Publication 800-38D
  • 2
    • 84965066515 scopus 로고    scopus 로고
    • The advanced encryption standard (AES)
    • NIST
    • NIST: The advanced encryption standard (AES). FIPS Publication 197 (2001)
    • (2001) FIPS Publication 197
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 8
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22, 265-279 (1981)
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 9
    • 0013259203 scopus 로고
    • A simple and key-economical unconditional authentication scheme
    • den Boer, B.: A simple and key-economical unconditional authentication scheme. Journal of Computer Security 2, 65-71 (1993)
    • (1993) Journal of Computer Security , vol.2 , pp. 65-71
    • Den Boer, B.1
  • 10
    • 84898476212 scopus 로고
    • An Integrity Check Value Algorithm for Stream Ciphers
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Taylor, R.: An Integrity Check Value Algorithm for Stream Ciphers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 40-48. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 40-48
    • Taylor, R.1
  • 11
    • 84974696785 scopus 로고
    • On Families of Hash Functions via Geometric Codes and Concatenation
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Bierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On Families of Hash Functions via Geometric Codes and Concatenation. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 331-342. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 331-342
    • Bierbrauer, J.1    Johansson, T.2    Kabatianskii, G.3    Smeets, B.4
  • 12
    • 24944476633 scopus 로고    scopus 로고
    • Stronger Security Bounds for Wegman-Carter-Shoup Authenticators
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Bernstein, D.J.: Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 164-180. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 164-180
    • Bernstein, D.J.1
  • 13
    • 26444458893 scopus 로고    scopus 로고
    • The Poly1305-AES Message-Authentication Code
    • Gilbert, H., Handschuh, H. (eds.) FSE 2005. Springer, Heidelberg
    • Bernstein, D.J.: The Poly1305-AES Message-Authentication Code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 32-49. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3557 , pp. 32-49
    • Bernstein, D.J.1
  • 14
    • 79952185079 scopus 로고    scopus 로고
    • A trade-off between collision probability and key size in universal hashing using polynomials
    • Sarkar, P.: A trade-off between collision probability and key size in universal hashing using polynomials. Designs, Codes and Cryptography 58(3), 271-278 (2011)
    • (2011) Designs, Codes and Cryptography , vol.58 , Issue.3 , pp. 271-278
    • Sarkar, P.1
  • 15
    • 84918495938 scopus 로고    scopus 로고
    • Authentication failures in NIST version of GCM
    • Joux, A.: Authentication failures in NIST version of GCM. NIST Comment (2006)
    • (2006) NIST Comment
    • Joux, A.1
  • 16
    • 51849140875 scopus 로고    scopus 로고
    • Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Handschuh, H., Preneel, B.: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 144-161. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 144-161
    • Handschuh, H.1    Preneel, B.2
  • 17
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Pohlig, S., Hellman, M.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 24(1), 106-110 (1978)
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 18
    • 84866636001 scopus 로고    scopus 로고
    • Authentication weaknesses in GCM
    • May
    • Ferguson, N.: Authentication weaknesses in GCM. NIST Comment (May 2005)
    • (2005) NIST Comment
    • Ferguson, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.