Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.4.91

A Security Analysis of PMAC and TMAC variant  

이창훈 (고려대학교 정보보호기술연구센터)
김종성 (고려대학교 정보보호기술연구센)
이상진 (고려대학교 정보보호기술연구센터)
Abstract
In this paper, we introduce two forgery attacks on the PMAC. If it has no truncation then the attack requires about $2^{n}$ 2+1/ chosen texts, otherwise, the attack requires about $2^{n}$ 2+1/ chosen texts and $2^{n-}$$\tau$ MAC verifications where $\tau$ is the size of the MAC. We also give a forgery attack on the TMAC variant which requires about $2^{n}$ 2+1/ texts.
Keywords
PMAC; TMAC; Forgery Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 ISO/IEC 9797-1. Information technologySecurity techniques-Message Authentication Codes 35:1626-1627, 1999
2 K. Kurosawa and T. Iwata, 'TMAC : Two-Key CBC-MAC'. Topics in Cryptology-CT-RSA 2003. LNCS 2612, pp. 33-49. Springer-Verlag, 2003
3 J. Black and P. Rogaway. 'A Block Cipher Mode of Operation for Parallelizable Message Authentication' Advances in Cryptology-Eurocrypt 2002. LNCS 2332, pp.384-397, Springer-Verlag. 2002
4 J. Sung, D. Hong, and S. Lee. 'Key Recovery Attacks on the RMAC, TMAC. and IACBC', ACISP 2003, LNCS 2727, pp 265-273, SpringerVerlag, 2003
5 J. Black and P. Rogaway. 'CBC MACs for arbitrary-length messages: The three key construction', Advances in Cryptology - Crypto 2000. LNCS 1880. pp.197-215. Springer-Verlag. 2000
6 T. Iwata and K. Kurosawa. 'OMAC : One-Key CBC MAC, FSE 2003, LNCS 2887, pp 137-162, Springer-Verlag, 2003
7 C. J. Mitchell. 'On the Security of XCBC, TMAC, and OMAC', Technical Report RHUL-MA-2003-4, 19, August, 2003
8 M. Bellare, J. Kilian. and P. Rogaway. 'The Security of the Cipher Block Chaining Message Authentication Code', Advanced in Cryptology-CRYPTO'94 LNCS 839, pp. 341-358, SpringerVerlag, 1994