Rotational cryptanalysis on MAC algorithm Chaskey

L Kraleva, T Ashur, V Rijmen - International Conference on Applied …, 2020 - Springer
In this paper we generalize the Markov theory with respect to a relation between two
plaintexts and not their difference and apply it for rotational pairs. We perform a related-key …

[PDF][PDF] Chaskey: a lightweight mac algorithm for microcontrollers

N Mouha, B Mennink, A Van Herrewege… - Lightweight …, 2015 - csrc.nist.gov
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …

Chaskey: an efficient MAC algorithm for 32-bit microcontrollers

N Mouha, B Mennink, A Van Herrewege… - Selected Areas in …, 2014 - Springer
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …

Key-recovery attacks against the MAC algorithm Chaskey

C Mavromati - International Conference on Selected Areas in …, 2015 - Springer
Abstract Chaskey is a Message Authentication Code (MAC) for 32-bit microcontrollers
proposed by Mouha et al. at SAC 2014. Its underlying blockcipher uses an Even-Mansour …

Cryptanalyses on a Merkle-Damgård Based MAC — Almost Universal Forgery and Distinguishing-H Attacks

Y Sasaki - IEICE Transactions on Fundamentals of Electronics …, 2014 - search.ieice.org
This paper presents two types of cryptanalysis on a Merkle-Damgård hash based MAC,
which computes a MAC value of a message M by Hash (K|| l|| M) with a shared key K and …

Key-recovery attacks on universal hash function based MAC algorithms

H Handschuh, B Preneel - Annual International Cryptology Conference, 2008 - Springer
This paper discusses key recovery and universal forgery attacks on several MAC algorithms
based on universal hash functions. The attacks use a substantial number of verification …

Improved differential-linear cryptanalysis of 7-round chaskey with partitioning

G Leurent - Annual International Conference on the Theory and …, 2016 - Springer
In this work we study the security of Chaskey, a recent lightweight MAC designed by Mouha
et al., currently being considered for standardization by ISO/IEC and ITU-T. Chaskey uses an …

New generic attacks against hash-based MACs

G Leurent, T Peyrin, L Wang - … 2013: 19th International Conference on the …, 2013 - Springer
In this paper we study the security of hash-based MAC algorithms (such as HMAC and
NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven …

[图书][B] Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

C Adams, A Miri, M Wiener - 2007 - books.google.com
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography.
This is the? rst time this workshop was held at the University of Ottawa. Previous workshops …

Key recovery and forgery attacks on the MacDES MAC algorithm

D Coppersmith, LR Knudsen, CJ Mitchell - Advances in Cryptology …, 2000 - Springer
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel
including two key recovery attacks and a forgery attack. Unlike previous attacks, these …