Uncategorized

Generic security of mac and hmac with input whitening

Hash-Function based PRFs: Bernstein , Stefano Tessaro. View 3 Excerpts.

ASIACRYPT 2015: Auckland, New Zealand

References Publications referenced by this paper. Showing of 23 references. Sort by: Influence Recency. View 10 Excerpts. Highly Influenced. View 6 Excerpts. View 9 Excerpts. View 8 Excerpts. Despite nearly two decades of research, their exact security still remains far from understood in many different contexts.

Generic Security of NMAC and HMAC with Input Whitening

Indeed, recent works have re-surfaced interest for generic attacks, i. In this paper, we ask the question of whether a small modification to HMAC and NMAC can allow us to exactly characterize the security of the resulting constructions, while only incurring little penalty with respect to efficiency.


  1. ASIACRYPT 2015: Auckland, New Zealand;
  2. Generic security of mac and hmac with input whitening skin.
  3. empire earth 2 mac patch.
  4. Conference papers.

To this end, we present simple variants of NMAC and HMAC, for which we prove tight bounds on the generic PRF security, expressed in terms of numbers of construction and compression function queries necessary to break the construction. All of our constructions are obtained via a near black-box modification of NMAC and HMAC, which can be interpreted as an initial step of key-dependent message pre-processing. While our focus is on PRF security, a further attractive feature of our new constructions is that they clearly defeat all recent generic attacks against properties such as state recovery and universal forgery.

We thank the anonymous reviewers for their helpful comments. Skip to main content. Advertisement Hide.

2010 – today

Conference paper First Online: This is a preview of subscription content, log in to check access. Acknowledgments We thank the anonymous reviewers for their helpful comments. An, J.

Journal papers

Wiener, M. LNCS, vol. Springer, Heidelberg Google Scholar. Bellare, M.: Dwork, C.

Navigation menu

Bellare, M. Keying hash functions for message authentication. Koblitz, N. A design principle for hash functions. Brassard, G.


  • free email validator for mac!
  • iomega storcenter manager download mac;
  • Generic Security of NMAC and HMAC with Input Whitening.
  • mac not starting up blue screen;
  • Generic Related-Key Attacks for HMAC.
  • wondershare youtube downloader full mac.
  • what is the best movie editing program for mac.
  • Dinur, I. Garay, J.

    Dodis, Y. To hash or not to hash again? Safavi-Naini, R. The exact PRF security of truncation: Gennaro, R. Goldreich, O. On the cryptographic applications of random functions.

    Gaëtan Leurent: publications

    Blakely, G. Guo, J. Hardy, G.