Truncation attacks on MACs

Mitchell, Chris J

(2003)

Mitchell, Chris J (2003) Truncation attacks on MACs. Electronics Letters, 39 (20).

Our Full Text Deposits

Full text access: Open

Full text file - 106.09 KB

Links to Copies of this Item Held Elsewhere



Abstract

A new type of attack on message authentication codes (MACs) is introduced which takes advantage of possible weaknesses in interfaces to hardware security modules. In particular, if a module does not fix the degree of MAC truncation employed, then potentially serious attacks are possible.

Information about this Version

This is a Submitted version
This version's date is: 6/2003
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/71ec54c2-8411-b837-0ea6-d0cf2cec53ab/9/

Item TypeJournal Article
TitleTruncation attacks on MACs
AuthorsMitchell, Chris J
Uncontrolled Keywordssecurity systems, cipher, authentication, hardware
Departments

Identifiers

doihttp://dx.doi.org/10.1049/el:20030921

Deposited by Research Information System (atira) on 04-Nov-2012 in Royal Holloway Research Online.Last modified on 04-Nov-2012

Notes

This is the final draft version of the paper that appeared in 'Electronics Letters', 39(20), June 2003.


Details