[11885] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Why is RMAC resistant to birthday attacks?

daemon@ATHENA.MIT.EDU (bear)
Tue Oct 22 14:12:27 2002

Date: Tue, 22 Oct 2002 11:09:41 -0700 (PDT)
From: bear <bear@sonic.net>
To: Ed Gerck <egerck@nma.com>
Cc: Victor.Duchovni@morganstanley.com,
	Cryptography <cryptography@wasabisystems.com>
In-Reply-To: <3DB58B0D.BD117040@nma.com>



On Tue, 22 Oct 2002, Ed Gerck wrote:

>Short answer:  Because the MAC tag is doubled in size.
>
>Longer answer: The =93birthday paradox=94 says that if the MAC tag has t b=
its,
>only 2^(t/2) queries to the MAC oracle are likely  needed in order to disc=
over
>two messages with the same tag, i.e., a =93collision,=94 from which forger=
ies
>could easily be constructed.



This is a point I don't think I quite "get". Suppose that I have
a MAC "oracle" and I bounce 2^32 messages off of it.  With a
64-bit MAC, the odds are about even that two of those messages
will come back with the same MAC.

But why does that buy me the ability to "easily" make a forgery?

Does it mean I can then create a bogus message, which the oracle
has never seen, and generate a MAC that checks for it?  If so
how?

In protocol terms, let's say Alice is a digital notary.  Documents
come in, and Alice attests to their existence on a particular
date by adding a datestamp, affixing a keyed MAC, and sending
them back.

Now Bob sends Alice 2^32 messages (and Alice's key-management
software totally doesn't notice that the key has been worn to
a nub and prompt her to revoke it).  Reviewing his files, Bob
finds that he has a January 21 document and a September 30
document which have the same MAC.

What does Bob do now?  How does this get Bob the ability to
create something Alice didn't sign, but which has a valid MAC
from Alice's key?

=09=09=09=09Bear




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post