[11909] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Why is RMAC resistant to birthday attacks?

daemon@ATHENA.MIT.EDU (Sidney Markowitz)
Tue Oct 22 22:07:12 2002

From: "Sidney Markowitz" <sidney@sidney.com>
To: "Ed Gerck" <egerck@nma.com>
Cc: <Victor.Duchovni@morganstanley.com>,
	"Cryptography" <cryptography@wasabisystems.com>
Date: Tue, 22 Oct 2002 18:53:37 -0700

Ed Gerck <egerck@nma.com> wrote:
> A minor nit, but sometimes looking into why
> things were devised is helpful.
> What I explained can be found in
> http://csrc.nist.gov/encryption/modes/workshop2/report.pdf

Thank you, that was really helpful in seeing the motivation for the work that led to
the NIST draft paper. The way I read it now, he includes a justification for block
cipher based MACs in general, then presents his RMAC, which he devised to deal with
the effect of the birthday surprise on the work factor of the forged extension attack
on other block cipher based MACS.

  -- sidney


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post