[11891] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Why is RMAC resistant to birthday attacks?

daemon@ATHENA.MIT.EDU (Wei Dai)
Tue Oct 22 16:20:37 2002

Date: Tue, 22 Oct 2002 15:05:46 -0400
From: Wei Dai <weidai@weidai.com>
To: bear <bear@sonic.net>
Cc: Ed Gerck <egerck@nma.com>, Victor.Duchovni@morganstanley.com,
	Cryptography <cryptography@wasabisystems.com>
In-Reply-To: <Pine.LNX.4.40.0210221036010.17888-100000@newbolt.sonic.net>

On Tue, Oct 22, 2002 at 11:09:41AM -0700, bear wrote:
> Now Bob sends Alice 2^32 messages (and Alice's key-management
> software totally doesn't notice that the key has been worn to
> a nub and prompt her to revoke it).  Reviewing his files, Bob
> finds that he has a January 21 document and a September 30
> document which have the same MAC.
> 
> What does Bob do now?  How does this get Bob the ability to
> create something Alice didn't sign, but which has a valid MAC
> from Alice's key?

Call the Jan 21 document x, and the Sept 30 document y. Now Bob knows
MAC_Alice(x | z) = MAC_Alice(y | z) for all z, because the internal states
of the MAC after processing x and y are the same and therefore will remain
equal given identical suffixes. So he can get a MAC on x | z and
it's also a valid MAC for y | z, which Alice didn't sign.  This applies
for CBC-MAC, DMAC, HMAC, and any another MAC that is not randomized or
maintains state (for example a counter) from message to message.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post