earticle

논문검색

Equivalent Key Recovery Attack to H2-MAC

초록

영어

In this paper, we propose an ecient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). We can successfully recover the equivalent key of H2-MAC in about 2n=2 on-line MAC queries and 2n=2 o-line hash computations with great probability. This attack shows that the security of H2-MAC is totally dependent on the col- lision resistance of the underlying hash function, instead of the PRF-AX of the underlying compression function in the origin security proof of H2-MAC.

목차

Abstract
 1 Introduction
 2 Preliminaries
  2.1 Notations
  2.2 Birthday Paradox
 3 Breaking H2-MAC Using Birthday Paradox
 4 Conclusion
 References

저자정보

  • Fanbao Liu School of Computer, National University of Defense Technology, Changsha, School of Computer, Beijing University of Technology
  • Tao Xie School of Computer, National University of Defense Technology, Changsha
  • Changxiang Shen School of Computer, Beijing University of Technology

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.