<--- Back to Details
First PageDocument Content
Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / HMAC / CMAC / Block cipher / MD5 / Message authentication codes / Cryptography / Block cipher modes of operation
Date: 2012-12-05 13:53:41
Finite fields
Hashing
Galois/Counter Mode
CBC-MAC
Cryptographic hash function
HMAC
CMAC
Block cipher
MD5
Message authentication codes
Cryptography
Block cipher modes of operation

Multiple forgery attacks against Message Authentication Codes

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 258,83 KB

Share Document on Facebook

Similar Documents

Cryptography / Emerging technologies / Quantum computing / Theoretical computer science / Data Encryption Standard / Applied mathematics / Block cipher / Key size / Quantum algorithm / RSA / Public-key cryptography

Introduction Forgery attack against CBC-MAC Modes of operations

DocID: 1xViB - View Document

Fast and Secure CBC-Type MAC Algorithms Mridul Nandi National Institute of Standards and Technology Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known meth

DocID: 1kOj9 - View Document

Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

DocID: 1jNBQ - View Document

Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation

Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

DocID: 1aGcV - View Document

Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

DocID: 12X4T - View Document