Abstract
The Alred construction is a lightweight strategy for constructing Message Authentication Codes (MACs). Although its original analysis shows that this construction is secure against attacks not involving internal collisions, it is unclear if the same is valid in a more generic scenario. In this paper, we complement that analysis, showing that one can expect a reasonable security level even when attackers try to explore such collisions. More specifically, we use the game-playing technique to formally evaluate the security of one Alred instance, Marvin, bounding its security in a quantitative manner; the security analysis is in the concrete-security paradigm. We then show how the concepts involved can be used in the analysis of Pelican, which follows the same design principles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362–399 (2000)
Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: Incrementality at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163–192. Springer, Heidelberg (1997)
Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint Archive, Report 2004/331 (2004), http://eprint.iacr.org/2004/331
Biryukov, A., Bogdanov, A., Khovratovich, D., Kasper, T.: Collision attacks on AES-based MAC: Alpha-MAC. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 166–180. Springer, Heidelberg (2007)
Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher Square. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 149–165. Springer, Heidelberg (1997)
Daemen, J., Rijmen, V.: A new MAC construction alred and a specific instance alpha-mac. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 1–17. Springer, Heidelberg (2005)
Daemen, J., Rijmen, V.: The Pelican MAC Function. Cryptology ePrint Archive, Report 2005/088 (2005), http://eprint.iacr.org/
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM (JACM) 33(4), 792–807 (1986)
Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26(3), 189–221 (2002), http://citeseer.ist.psu.edu/443539.html
Jia, K., Wang, X., Yuan, Z., Xu, G.: Distinguishing attack and second-preimage attack on the CBC-like MACs. Cryptology ePrint Archive, Report 2008/542 (2008), http://eprint.iacr.org/
Keliher, L.: Refined analysis of bounds related to linear and differential cryptanalysis for the AES. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 42–57. Springer, Heidelberg (2005)
Keliher, L., Sui, J.: Exact maximum expected differential and linear probability for 2-round advanced encryption standard. Information Security, IET 1(2), 53–57 (2007), http://citeseer.ist.psu.edu/738374.html
McGrew, D., Viega, J.: The galois/counter mode of operation (GCM). Submission to NIST Modes of Operation Process (May 2005), http://www.cryptobarn.com/papers/gcm-spec.pdf
Minematsu, K., Matsushima, T.: Improved MACs from differentially-uniform permutations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E90-A(12), 2908–2915 (2007)
NIST. Federal Information Processing Standard (FIPS 197) – Advanced Encryption Standard (AES). National Institute of Standards and Technology (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
NIST. Special Publication 800-38B Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication. National Institute of Standards and Technology, U.S. Department of Commerce (May 2005), http://csrc.nist.gov/publications/PubsSPs.html
NIST. Special Publication 800-38D – Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. National Institute of Standards and Technology, U.S. Department of Commerce (November 2007), http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
Park, S., Sung, S., Lee, S., Lim, J.: Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 247–260. Springer, Heidelberg (2003)
Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., De Win, E.: The cipher Shark. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 99–111. Springer, Heidelberg (1996)
Sandia. Submission to NIST: Cipher-state (CS) mode of operation for AES (2004), http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/cs/cs-spec.pdf
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (November 2004), http://eprint.iacr.org/2004/332
Simplicio, M., Barbuda, P., Barreto, P., Carvalho, T., Margi, C.: The marvin message authentication code and the lettersoup authenticated encryption scheme. Security and Communication Networks 2, 165–180 (2009)
Stinson, D.R.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall/CRC Press, Boca Raton (2002)
Wang, W., Wang, X., Xu, G.: Impossible differential cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES. Cryptology ePrint Archive, Report 2009/005 (2009), http://eprint.iacr.org/
Wegman, M., Carter, J.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22, 265–279 (1981)
Yuan, Z., Wang, W., Jia, K., Xu, G., Wang, X.: New birthday attacks on some mACs based on block ciphers. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 209–230. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Simplício, M.A., Barreto, P.S.L.M., Carvalho, T.C.M.B. (2011). Revisiting the Security of the Alred Design. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds) Information Security. ISC 2010. Lecture Notes in Computer Science, vol 6531. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18178-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-18178-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-18177-1
Online ISBN: 978-3-642-18178-8
eBook Packages: Computer ScienceComputer Science (R0)