2006
DOI: 10.1007/11832072_17
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
66
1
1

Year Published

2006
2006
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 77 publications
(68 citation statements)
references
References 13 publications
0
66
1
1
Order By: Relevance
“…Note that the notion of PRF-security is identical to the notion of distinguishing-R, first defined in [14] and often used in the cryptanalytic literature on hash-based MACs.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that the notion of PRF-security is identical to the notion of distinguishing-R, first defined in [14] and often used in the cryptanalytic literature on hash-based MACs.…”
Section: Preliminariesmentioning
confidence: 99%
“…Distinguishing-H. A further security notion defined in [14] is the so-called distinguishing-H security. Here, the goal of the adversary is to distinguish the hash-based MAC construction C K [f] using its underlying compression function f (say SHA-1) and a random key K, from the same construction C K [g] built on top of an independent random compression function g. In the ideal compression function model, where we model already the initial compression function f as ideal, this corresponds to distinguishing a pair of oracles (…”
Section: Preliminariesmentioning
confidence: 99%
“…DC has become a general type of attack, and it has been adapted to stream ciphers [7], hash functions [8], and MAC algorithms [9].…”
Section: Differential Cryptanalysismentioning
confidence: 99%
“…Recent work [2,3,15,16,17,19] discovered devastating collision attacks on hash functions from the MDx family. Such attacks have undermined the confidence in the most popular hash functions such as MD5 and SHA-1, and promoted the reevaluation of the actual security of the MAC algorithms based on them [4,6,8,11,12,14,18].…”
Section: Introductionmentioning
confidence: 99%
“…There are two kinds of distinguishing attacks on MACs, and they are respectively called distinguishing-R and distinguishing-H attacks [8]. Distinguishing-R attack means distinguishing a MAC from a random function, and distinguishing-H attack detects an instantiated MAC (by an underlying hash function or block cipher) from a MAC with a random function.…”
Section: Introductionmentioning
confidence: 99%