Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.2.63

Improved Key-Recovery Attacks on HMAC/NMAC-MD4  

Kang, Jin-Keon (Korea University)
Lee, Je-Sang (Korea University)
Sung, Jae-Chul (University of Seoul)
Hong, Seok-Hie (Korea University)
Ryu, Heui-Su (Gyeongin National University of Education)
Abstract
In 2005, Wang et al. discovered devastating collision attacks on the main hash functions from the MD4 family. After the discovery of Wang, many analysis results on the security of existing hash-based cryptographic schemes are presented. At CRYPTO'07, Fouque, Leurent and Nguyen presented full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5[4]. Such attacks are based on collision attacks on the underlying hash function, and the most expensive stage is the recovery of the outer key. At EUROCRYPT'08, Wang, Ohta and Kunihiro presented improved outer key recovery attack on HMAC/NMAC-MD4, by using a new near collision path with a high probability[2]. This improves the complexity of the full key-recovery attack on HMAC/NMAC-MD4 which proposed by Fouque, Leurent and Nguyen at CRYPTO'07: The MAC queries decreases from $2^{88}$ to $2^{72}$, and the number of MD4 computations decreases from $2^{95}$ to $2^{77}$. In this paper, we propose improved outer key-recovery attack on HMAC/NMAC-MD4 with $2^{77.1246}$ MAC queries and $2^{37}$ MD4 computations, by using divide and conquer paradigm.
Keywords
HMAC; NMAC; MD4; Key-Recovery; Near Collision; Differential Path;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Leurent, "Message Freedom in MD4 and MD5 Collisions: Application to APOP," Advances in Cryptology - FSE 2007, LNCS 4593 pp. 309-328, 2007   DOI
2 X. Wang. H. Yu, and Y.L. Yin, "Efficient Collision Search Attacks on SHA-O," Advances in Cryptology CRYPTO 2005, LNCS 3621. pp. 1-16, 2005   DOI
3 Y. Sasaki. G. Yamamoto, and K. Aoki. "Practical Password Recovery on an MD5 Challenge and Response," IACR ePrint archive 2007-101, Mar. 2007
4 M. Bellare. R. Canetti. and H. Krawczyk. "Keying Hash Functions for Message Authentication." Advances in Cryptology - CRYPTO 1996, LNCS 1109, pp. 1-15,1996   DOI
5 X. Wang and H. Yu. "How to Break MD5 and Other Hash Functions." Advances in Cryptology - EUROCRYPT 2005, LNCS 3494, pp. 19-35, 2005   DOI
6 L. Wang, K. Ohta. and N. Kunihiro, ''New Key-Recovery Attacks on HMAC/NMACMD4 and NMAC-MD5," Advances in Cryptology - EUROCRYPT 2008, LNCS 4965, pp. 237-253, 2008   DOI
7 X. Wang. Y.L. Yin, and H. Yu, "Finding Collisions in the Full SHA-l," Advances in Cryptology CRYPTO 2005, LNCS 3621, pp. 17-36, 2005   DOI   ScienceOn
8 Y. Sasaki. L. Wang, K. Ohta, and N. Kunihiro. "Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function," Advances in Cryptology - AFRICACRYPT 2008, LNCS 5023, pp. 290-307, 2008   DOI
9 S. Contini and Y.L. Yin, "Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions," Advances in Cryptology - ASlACRYPT 2006, LNCS 4284. pp. 37-53, 2006   DOI   ScienceOn
10 PA Fouque. G. Leurent. and P.Q. Nguyen, "Full Key-Recovery Attacks on HMAC/NMAC- MD4 and NMAC-MD5," Advances in Cryptology CRYPTO 2007,LNCS 4622. pp. 13-30, 2007   DOI   ScienceOn
11 X. Wang. X. Lai. D. Feng, H. Chen. and X. Yu. "Cryptanalysis of the Hash Functions MD4 and RIPEMD," Advances in Cryptology - EUROCRYPT 2005, LNCS 3494, pp. 1-18, 2005   DOI