A tight bound for exhaustive key search attacks against Message Authentication Codes

A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key d...

Full description

Saved in:
Bibliographic Details
Published inRAIRO. Informatique théorique et applications Vol. 47; no. 2; pp. 171 - 180
Main Authors de SÁ, Vinícius G.P., Boccardo, Davidson R., Rust, Luiz Fernando, Machado, Raphael C.S.
Format Journal Article
LanguageEnglish
Published Paris EDP Sciences 01.04.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key: from a set containing initially all possible key candidates, subsequently remove those that yield an incorrect authentication, proceeding this way for each intercepted message/authentication pair until a single key remains. In this paper, we determine an exact formula for the expected number of message/authentication pairs that must be used before such form of attack is successful, along with an asymptotical bound that is both simple and tight. We conclude by illustrating a modern application where this bound comes in handy, namely the estimation of security levels in reflection-based verification of software integrity.
Bibliography:vigusmao@dcc.ufrj.br
publisher-ID:ita120015
PII:S0988375412000252
istex:C779768CB60F7BBDAFB9D1C2E53375481D10E247
ark:/67375/80W-1XF7TBX0-7
ISSN:0988-3754
1290-385X
DOI:10.1051/ita/2012025