Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit f...
Saved in:
Published in | Information Security and Privacy pp. 138 - 151 |
---|---|
Main Authors | , , , , |
Format | Book Chapter |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given. |
---|---|
ISBN: | 3642314473 9783642314476 |
ISSN: | 0302-9743 1611-3349 |
DOI: | 10.1007/978-3-642-31448-3_11 |