Abstract
We discuss the security of Message Authentication Code (MAC) schemes from the viewpoint of differential attack, and propose an attack that is effective against DES-MAC and FEAL-MAC. The attack derives the secret authentication key in the chosen plaintext scenario. For example, DES(8-round)-MAC can be broken with 234 pairs of plaintext, while FEAL8-MAC can be broken with 222 pairs. The proposed attack is applicable to any MAC scheme, even if the 32-bits are randomly selected from among the 64-bits of ciphertext generated by a cryptosystem vulnerable to differential attack in the chosen plaintext scenario.
Chapter PDF
Similar content being viewed by others
References
E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems,” Journal of CRYPTOLOGY, Vol. 4, Number 1, 1991 (The extended abstract appeared at CRYPTO’90)
E. Biham and A. Shamir, “Differential Cryptanalysis of Feal and N-Hash,” EUROCRYPT’91
E. Biham and A. Shamir, “Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer,” CRYPT0’91
E. Biham and A. Shamir, “Differential Cryptanalysis of the full 16-round DES,” CRYPTO’92
A. Tardy-Corfdir, and H. Gilbert, “A known plaintext attack of FEAL-4 and FEAL-6,” CRYPTO’91
I. Damgård, “Collision free hash functions and public key signature schemes,” EUROCRYPT’87
D. W. Davies and W. L. Price, “The application of digital signatures based on public key cryptosystems,” Proceedings of ICC, 1980, pp.525–530
“Data Encryption Standard.” Federal Information Processing Standards Publication 46, National Bureau of Standards, U.S. Department of Commerce, 1977
“Banking-Approved algorithm for message authentication — Part 1: DEA-1.”
“Banking-Approved algorithm for message authentication — Part 2: Message authentication algorithm.”
T. Kaneko, “A known plaintext cryptanalytic attack on FEAL-4,” Technical Report of the Institute of Electronics, Information and Communication Engineers, ISEC91-25 (1991)
M. Matsui, “Linear Cryptanalysis Method for DES Cipher,” EUROCRYPT’93
S. Miyaguchi, S. Kurihara, K. Ohta, and H. Morita, “Expansion of FEAL Cipher,” NTT Review, Vol. 2, No. 6, 1990
S. Miyaguchi, K. Ohta and M. Iwata, “Confirmation that Some Hash Functions are not Collision Free,” EUROCRYPT’90
S. Miyaguchi, A. Shiraishi, and A. Shimizu, “Fast data encryption algorithm FEAL-8,” Review of Electrical Communication Laboratories, Vol. 36, No. 4, 1988
M. Matsui and A. Yamagishi, “A New Method for Known Plaintext Attack of FEAL Cipher,” EUROCRYPT’92
Y. Zheng, T. Matsumoto and H. Imai, “Structural Properties of One-Way Hash Functions,” CRYPTO’90
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ohta, K., Matsui, M. (1994). Differential Attack on Message Authentication Codes. In: Stinson, D.R. (eds) Advances in Cryptology — CRYPTO’ 93. CRYPTO 1993. Lecture Notes in Computer Science, vol 773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48329-2_18
Download citation
DOI: https://doi.org/10.1007/3-540-48329-2_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57766-9
Online ISBN: 978-3-540-48329-8
eBook Packages: Springer Book Archive