@article{ART002312265},
author={RYU GAYEON and Deukjo Hong},
title={Key Recovery Attacks on HMAC with Reduced-Round AES},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2018},
volume={23},
number={1},
pages={57-66},
doi={10.9708/jksci.2018.23.01.057}
TY - JOUR
AU - RYU GAYEON
AU - Deukjo Hong
TI - Key Recovery Attacks on HMAC with Reduced-Round AES
JO - Journal of The Korea Society of Computer and Information
PY - 2018
VL - 23
IS - 1
PB - The Korean Society Of Computer And Information
SP - 57
EP - 66
SN - 1598-849X
AB - It is known that a single-key and a related-key attacks on AES-128 are possible for at most 7 and 8 rounds, respectively. The security of CMAC, a typical block-cipher-based MAC algorithm, has very high possibility of inheriting the security of the underlying block cipher. Since the attacks on the underlying block cipher can be applied directly to the first block of CMAC, the current security margin is not sufficient compared to what the designers of AES claimed. In this paper, we consider HMAC-DM-AES-128 as an alternative to CMAC-AES-128 and analyze its security for reduced rounds of AES-128. For 2-round AES-128, HMAC-DM-AES-128 requires the precomputation phase time complexity of 2 97 AES, the online phase time complexity of 2 98.68 AES and the data complexity of 2 98 blocks. Our work is meaningful in the point that it is the first security analysis of MAC based on hash modes of AES.
KW - AES;HMAC;MAC
DO - 10.9708/jksci.2018.23.01.057
ER -
RYU GAYEON and Deukjo Hong. (2018). Key Recovery Attacks on HMAC with Reduced-Round AES. Journal of The Korea Society of Computer and Information, 23(1), 57-66.
RYU GAYEON and Deukjo Hong. 2018, "Key Recovery Attacks on HMAC with Reduced-Round AES", Journal of The Korea Society of Computer and Information, vol.23, no.1 pp.57-66. Available from: doi:10.9708/jksci.2018.23.01.057
RYU GAYEON, Deukjo Hong "Key Recovery Attacks on HMAC with Reduced-Round AES" Journal of The Korea Society of Computer and Information 23.1 pp.57-66 (2018) : 57.
RYU GAYEON, Deukjo Hong. Key Recovery Attacks on HMAC with Reduced-Round AES. 2018; 23(1), 57-66. Available from: doi:10.9708/jksci.2018.23.01.057
RYU GAYEON and Deukjo Hong. "Key Recovery Attacks on HMAC with Reduced-Round AES" Journal of The Korea Society of Computer and Information 23, no.1 (2018) : 57-66.doi: 10.9708/jksci.2018.23.01.057
RYU GAYEON; Deukjo Hong. Key Recovery Attacks on HMAC with Reduced-Round AES. Journal of The Korea Society of Computer and Information, 23(1), 57-66. doi: 10.9708/jksci.2018.23.01.057
RYU GAYEON; Deukjo Hong. Key Recovery Attacks on HMAC with Reduced-Round AES. Journal of The Korea Society of Computer and Information. 2018; 23(1) 57-66. doi: 10.9708/jksci.2018.23.01.057
RYU GAYEON, Deukjo Hong. Key Recovery Attacks on HMAC with Reduced-Round AES. 2018; 23(1), 57-66. Available from: doi:10.9708/jksci.2018.23.01.057
RYU GAYEON and Deukjo Hong. "Key Recovery Attacks on HMAC with Reduced-Round AES" Journal of The Korea Society of Computer and Information 23, no.1 (2018) : 57-66.doi: 10.9708/jksci.2018.23.01.057