CryptoDB
An Analysis of RMAC
Authors: | |
---|---|
Download: | |
Abstract: | A recent trend in message authentication is the use of a randomizing parameter, such that the authentication tag is based not only on the message and the key, but a public nonce which is changed for every authenticated message. This generally affords a better security proof. However, several new classes of attacks are made available by these techniques. We examine these attacks, and apply some of them to RMAC, a recently published MAC mechanism. |
BibTeX
@misc{eprint-2002-11693, title={An Analysis of RMAC}, booktitle={IACR Eprint archive}, keywords={secret-key cryptography / message authentication codes, cryptanalysis}, url={http://eprint.iacr.org/2002/170}, note={ lloyd@acm.jhu.edu 12009 received 11 Nov 2002, last revised 18 Nov 2002}, author={Jack Lloyd}, year=2002 }