Partial key recovery attack against RMAC

Knudsen, Lars R. and Mitchell, Chris J

(2005)

Knudsen, Lars R. and Mitchell, Chris J (2005) Partial key recovery attack against RMAC. Journal of Cryptology, 18 (4).

Our Full Text Deposits

Full text access: Open

Full Text - 198.63 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this paper new “partial” key recovery attacks against the RMAC block cipher based Message Authentication Code scheme are described. That is we describe attacks that, in some cases, recover one of the two RMAC keys much more efficiently than previously described attacks. Although all attacks, but one, are of no major threat in practice, in some cases there is reason for concern. In particular, the recovery of the second RMAC key (of k bits) may only require around 2k/2 block cipher operations (encryptions or decryptions). The RMAC implementation using triple DES proposed by NIST is shown to be very weak.

Information about this Version

This is a Submitted version
This version's date is: 2/2005
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/a8611a34-e2c9-da3a-fc87-5d9e6a4a38f8/2/

Item TypeJournal Article
TitlePartial key recovery attack against RMAC
AuthorsKnudsen, Lars R.
Mitchell, Chris J
Uncontrolled KeywordsMessage Authentication Codes, RMAC, AES, Triple DES, encryption, block cipher, key recovery attacks
DepartmentsResearch Groups and Centres\Information Security\ Information Security Group
Faculty of Science\Mathematics

Identifiers

doihttp://dx.doi.org/10.1007/s00145-004-0324-7

Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012

Notes

The original publication is available at www.springerlink.com
Copyright 2005 Springer Verlag.


Details