Rotational cryptanalysis on MAC algorithm Chaskey
In this paper we generalize the Markov theory with respect to a relation between two
plaintexts and not their difference and apply it for rotational pairs. We perform a related-key …
plaintexts and not their difference and apply it for rotational pairs. We perform a related-key …
[PDF][PDF] Chaskey: a lightweight mac algorithm for microcontrollers
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
Key-recovery attacks against the MAC algorithm Chaskey
C Mavromati - International Conference on Selected Areas in …, 2015 - Springer
Abstract Chaskey is a Message Authentication Code (MAC) for 32-bit microcontrollers
proposed by Mouha et al. at SAC 2014. Its underlying blockcipher uses an Even-Mansour …
proposed by Mouha et al. at SAC 2014. Its underlying blockcipher uses an Even-Mansour …
Cryptanalyses on a Merkle-Damgård Based MAC — Almost Universal Forgery and Distinguishing-H Attacks
Y Sasaki - IEICE Transactions on Fundamentals of Electronics …, 2014 - search.ieice.org
This paper presents two types of cryptanalysis on a Merkle-Damgård hash based MAC,
which computes a MAC value of a message M by Hash (K|| l|| M) with a shared key K and …
which computes a MAC value of a message M by Hash (K|| l|| M) with a shared key K and …
Key-recovery attacks on universal hash function based MAC algorithms
H Handschuh, B Preneel - Annual International Cryptology Conference, 2008 - Springer
This paper discusses key recovery and universal forgery attacks on several MAC algorithms
based on universal hash functions. The attacks use a substantial number of verification …
based on universal hash functions. The attacks use a substantial number of verification …
Improved differential-linear cryptanalysis of 7-round chaskey with partitioning
G Leurent - Annual International Conference on the Theory and …, 2016 - Springer
In this work we study the security of Chaskey, a recent lightweight MAC designed by Mouha
et al., currently being considered for standardization by ISO/IEC and ITU-T. Chaskey uses an …
et al., currently being considered for standardization by ISO/IEC and ITU-T. Chaskey uses an …
New generic attacks against hash-based MACs
In this paper we study the security of hash-based MAC algorithms (such as HMAC and
NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven …
NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven …
[图书][B] Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography.
This is the? rst time this workshop was held at the University of Ottawa. Previous workshops …
This is the? rst time this workshop was held at the University of Ottawa. Previous workshops …
Key recovery and forgery attacks on the MacDES MAC algorithm
D Coppersmith, LR Knudsen, CJ Mitchell - Advances in Cryptology …, 2000 - Springer
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel
including two key recovery attacks and a forgery attack. Unlike previous attacks, these …
including two key recovery attacks and a forgery attack. Unlike previous attacks, these …