A tight bound for exhaustive key search attacks against Message Authentication Codes
A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key d...
Saved in:
Published in | RAIRO. Informatique théorique et applications Vol. 47; no. 2; pp. 171 - 180 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Paris
EDP Sciences
01.04.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key: from a set containing initially all possible key candidates, subsequently remove those that yield an incorrect authentication, proceeding this way for each intercepted message/authentication pair until a single key remains. In this paper, we determine an exact formula for the expected number of message/authentication pairs that must be used before such form of attack is successful, along with an asymptotical bound that is both simple and tight. We conclude by illustrating a modern application where this bound comes in handy, namely the estimation of security levels in reflection-based verification of software integrity. |
---|---|
Bibliography: | vigusmao@dcc.ufrj.br publisher-ID:ita120015 PII:S0988375412000252 istex:C779768CB60F7BBDAFB9D1C2E53375481D10E247 ark:/67375/80W-1XF7TBX0-7 |
ISSN: | 0988-3754 1290-385X |
DOI: | 10.1051/ita/2012025 |