원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.6 No.2
2012.04
pp.397-402
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
In this paper, we propose an ecient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). We can successfully recover the equivalent key of H2-MAC in about 2n=2 on-line MAC queries and 2n=2 o-line hash computations with great probability. This attack shows that the security of H2-MAC is totally dependent on the col- lision resistance of the underlying hash function, instead of the PRF-AX of the underlying compression function in the origin security proof of H2-MAC.
목차
Abstract
1 Introduction
2 Preliminaries
2.1 Notations
2.2 Birthday Paradox
3 Breaking H2-MAC Using Birthday Paradox
4 Conclusion
References
1 Introduction
2 Preliminaries
2.1 Notations
2.2 Birthday Paradox
3 Breaking H2-MAC Using Birthday Paradox
4 Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
