TELKOMNIKA (Telecommunication Computing Electronics and Control)
Vol 11, No 2: June 2013

On the Security of NMAC and Its Variants

Fanbao Liu (National University of Defense Technology)
Changxiang Shen (Beijing University of Technology)
Tao Xie ((NUDT) National University of Defense Technology)
Dengguo Feng (Chinese Academy of Sciences)



Article Info

Publish Date
01 Jun 2013

Abstract

Based on the three earlier MAC (Message Authentication Code) construction approaches, we propose and analyze some variants of NMAC. We propose  some key recovery attacks to  these  NMAC  variants, for  example, we can  recover  the  equivalent  inner  key  of NMAC  in  about O(2n/2) MAC  operations, in  a related key  setting. We  propose  NMAC-E, a  variant of NMAC  with  secret  envelop,  to  achieve  more  process  efficiency  and  no  loss  of security, which needs only one call to the  underlying hash  function, instead of two invocations in HMAC.

Copyrights © 2013






Journal Info

Abbrev

TELKOMNIKA

Publisher

Subject

Computer Science & IT

Description

Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of ...