Back to Search
Start Over
Improved Generic Attacks Against Hash-Based MACs and HAIFA.
- Source :
- Algorithmica; Dec2017, Vol. 79 Issue 4, p1161-1195, 35p
- Publication Year :
- 2017
-
Abstract
- The security of HMAC (and more general hash-based MACs) against state-recovery and universal forgery attacks was shown to be suboptimal, following a series of results by Leurent et al. and Peyrin et al. These results have shown that such powerful attacks require significantly less than $$2^{\ell }$$ computations, contradicting the common belief (where $$\ell $$ denotes the internal state size). In this work, we revisit and extend these results, with a focus on concrete hash functions that limit the message length, and apply special iteration modes. We begin by devising the first state-recovery attack on HMAC with a HAIFA hash function (using a block counter in every compression function call), with complexity $$2^{4\ell /5}$$ . Then, we describe improved tradeoffs between the message length and the complexity of a state-recovery attack on HMAC with a Merkle-Damgård hash function. Consequently, we obtain improved attacks on several HMAC constructions used in practice, in which the hash functions limits the maximal message length (e.g., SHA-1 and SHA-2). Finally, we present the first universal forgery attacks, which can be applied with short message queries to the MAC oracle. In particular, we devise the first universal forgery attacks applicable to SHA-1 and SHA-2. Despite their theoretical interest, our attacks do not seem to threaten the practical security of the analyzed concrete HMAC constructions. [ABSTRACT FROM AUTHOR]
- Subjects :
- COMPUTER networks
COMPUTER security
CYBERTERRORISM
HASHING
COMPUTER science
Subjects
Details
- Language :
- English
- ISSN :
- 01784617
- Volume :
- 79
- Issue :
- 4
- Database :
- Complementary Index
- Journal :
- Algorithmica
- Publication Type :
- Academic Journal
- Accession number :
- 125430017
- Full Text :
- https://doi.org/10.1007/s00453-016-0236-6