International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

An Analysis of RMAC

Authors:
Jack Lloyd
Download:
URL: http://eprint.iacr.org/2002/170
Search ePrint
Search Google
Abstract: A recent trend in message authentication is the use of a randomizing parameter, such that the authentication tag is based not only on the message and the key, but a public nonce which is changed for every authenticated message. This generally affords a better security proof. However, several new classes of attacks are made available by these techniques. We examine these attacks, and apply some of them to RMAC, a recently published MAC mechanism.
BibTeX
@misc{eprint-2002-11693,
  title={An Analysis of RMAC},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / message authentication codes, cryptanalysis},
  url={http://eprint.iacr.org/2002/170},
  note={ lloyd@acm.jhu.edu 12009 received 11 Nov 2002, last revised 18 Nov 2002},
  author={Jack Lloyd},
  year=2002
}