Key recovery attack on ANSI retail MAC

Mitchell, Chris J

(2003)

Mitchell, Chris J (2003) Key recovery attack on ANSI retail MAC. Electronics Letters, 39 (4).

Our Full Text Deposits

Full text access: Open

Full text file - 115.03 KB

Full text file - 104.98 KB

Links to Copies of this Item Held Elsewhere


Abstract

A new type of attack is introduced which takes advantage of MAC truncation to simplify key recovery attacks based on MAC verifications. One example of the attack is described which, in certain circumstances, enables a more efficient attack than was previously known to be launched against the ANSI retail MAC. The existence of this attack means that truncation for this MAC scheme should be used with greater care than was previously believed, and very short MACs should be avoided altogether.

Information about this Version

This is a Submitted version
This version's date is: 2/2003
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/d66c65c3-cd6a-ddd6-e136-ad8c99125292/10/

Item TypeJournal Article
TitleKey recovery attack on ANSI retail MAC
AuthorsMitchell, Chris J
Uncontrolled KeywordsMAC truncation, attacks
Departments

Identifiers

doihttp://dx.doi.org/10.1049/el:20030272

Deposited by Research Information System (atira) on 22-Jul-2014 in Royal Holloway Research Online.Last modified on 22-Jul-2014

Notes

This is the final draft version of the paper that appeared in 'Electronics Letters', 39(4) February 2003.


Details