• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Liu, Fanbao (Liu, Fanbao.) | Xie, Tao (Xie, Tao.) | Shen, Changxiang (Shen, Changxiang.)

Indexed by:

EI Scopus

Abstract:

In this paper, we propose an efficient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). We can successfully recover the equivalent key of H2-MAC in about 2n/2 on-line MAC queries and 2n/2 off-line hash computations with great probability. This attack shows that the security of H2-MAC is totally dependent on the collision resistance of the underlying hash function, instead of the PRF-AX of the underlying compression function in the origin security proof of H2-MAC.

Keyword:

Hash functions Recovery

Author Community:

  • [ 1 ] [Liu, Fanbao]School of Computer, National University of Defense Technology, Changsha, 410073, Hunan, China
  • [ 2 ] [Liu, Fanbao]School of Computer, Beijing University of Technology, 100124, Beijing, China
  • [ 3 ] [Xie, Tao]School of Computer, National University of Defense Technology, Changsha, 410073, Hunan, China
  • [ 4 ] [Shen, Changxiang]School of Computer, Beijing University of Technology, 100124, Beijing, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

International Journal of Security and its Applications

ISSN: 1738-9976

Year: 2012

Issue: 2

Volume: 6

Page: 397-402

ESI Discipline: COMPUTER SCIENCE;

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 8

Online/Total:684/10648701
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.