CBC MACs for arbitrary-length messages: The three-key constructions

We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M {0,1}*using max{1, Γ |M|/nΓ} applications of the underlying n-bit block cipher. Our f...

全面介紹

Saved in:
書目詳細資料
Main Authors: Black J., Rogaway P.
格式: Article
語言:English
出版: 2014
在線閱讀:http://www.scopus.com/inward/record.url?eid=2-s2.0-17444383008&partnerID=40&md5=ae4e8118c141626d65584527d78d206b
http://cmuir.cmu.ac.th/handle/6653943832/4996
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M {0,1}*using max{1, Γ |M|/nΓ} applications of the underlying n-bit block cipher. Our favorite construction, XCBC, works like this: if |M| is a positive multiple of n then XOR the n-bit key K2 with the last block of M and compute the CBC MAC keyed with K1; otherwise, extend M's length to the next multiple of n by appending minimal 10ℓ padding (ℓ ≥ 0), XOR the n-bit key K3 with the last block of the padded message, and compute the CBC MAC keyed with K1. We prove the security of this and other constructions, giving concrete bounds on an adversary's inability to forge in terms of his inability to distinguish the block cipher from a random permutation. Our analysis exploits new ideas which simplify proofs compared with prior work. © 2004 International Association for Cryptologic Research.