MDx-MAC and building fast MACs from hash functions
B Preneel, PC Van Oorschot - Annual International Cryptology Conference, 1995 - Springer
We consider the security of message authentication code (MAC) algorithms, and the
construction of MACs from fast hash functions. A new forgery attack applicable to all iterated …
construction of MACs from fast hash functions. A new forgery attack applicable to all iterated …
On the security of iterated message authentication codes
B Preneel, PC Van Oorschot - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
The security of iterated message authentication code (MAC) algorithms is considered, and in
particular, those constructed from unkeyed hash functions. A new MAC forgery attack …
particular, those constructed from unkeyed hash functions. A new MAC forgery attack …
Key-recovery attacks on universal hash function based MAC algorithms
H Handschuh, B Preneel - Annual International Cryptology Conference, 2008 - Springer
This paper discusses key recovery and universal forgery attacks on several MAC algorithms
based on universal hash functions. The attacks use a substantial number of verification …
based on universal hash functions. The attacks use a substantial number of verification …
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
HMAC is a widely used message authentication code and a pseudorandom function
generator based on cryptographic hash functions such as MD5 and SHA-1. It has been …
generator based on cryptographic hash functions such as MD5 and SHA-1. It has been …
UMAC: Fast and secure message authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages
(in software, on contemporary machines) roughly an order of magnitude faster than current …
(in software, on contemporary machines) roughly an order of magnitude faster than current …
Keying hash functions for message authentication
The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has
become a standard approach in many applications, particularly Internet security protocols …
become a standard approach in many applications, particularly Internet security protocols …
Method of building fast MACS from hash functions
BKB Preneel, PC Van Oorschot - US Patent 5,664,016, 1997 - Google Patents
Hash functions are important in modern cryptography. Main applications are their use in
conjunction with digital signa ture schemes and message authentication. Hash functions …
conjunction with digital signa ture schemes and message authentication. Hash functions …
RFC2104: HMAC: Keyed-hashing for message authentication
This document describes HMAC, a mechanism for message authentication using
cryptographic hash functions. HMAC can be used with any iterative cryptographic hash …
cryptographic hash functions. HMAC can be used with any iterative cryptographic hash …
[PDF][PDF] The keyed-hash message authentication code (hmac)
JM Turner - Federal Information Processing Standards Publication, 2008 - csrc.nist.gov
FIPS 198-1, The Keyed-Hash Message Authentication Code (HMAC) Page 1 FIPS PUB 198-1
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash …
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash …
[PDF][PDF] Message authentication using hash functions: The HMAC construction
There has recently been a lot of interest in the subject of authenticating information using
cryptographic hash functions like MD5 and SHA, particularly for Internet security protocols …
cryptographic hash functions like MD5 and SHA, particularly for Internet security protocols …