Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers

This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit f...

Full description

Saved in:
Bibliographic Details
Published inInformation Security and Privacy pp. 138 - 151
Main Authors ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, Wong, Kenneth Koon-Ho
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
ISBN:3642314473
9783642314476
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-642-31448-3_11