Chris J. Mitchell (2003) Truncation attacks on MACs. Electronics Letters, 39 (20).
Full text access: Open
A new type of attack on message authentication codes (MACs) is introduced which takes advantage of possible weaknesses in interfaces to hardware security modules. In particular, if a module does not fix the degree of MAC truncation employed, then potentially serious attacks are possible.
This is a Published version This version's date is: 06/2003 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/71ec54c2-8411-b837-0ea6-d0cf2cec53ab/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010
This is the final draft version of the paper that appeared in 'Electronics Letters', 39(20), June 2003.