## CryptoDB

### Paper: The Power of Verification Queries in Message Authentication and Authenticated Encryption

Authors: Mihir Bellare Oded Goldreich Anton Mityagin URL: http://eprint.iacr.org/2004/309 Search ePrint Search Google This paper points out that, contrary to popular belief, allowing a message authentication adversary multiple verification attempts towards forgery is NOT equivalent to allowing it a single one, so that the notion of security that most message authentication schemes are proven to meet does not guarantee their security in practice. We then show, however, that the equivalence does hold for STRONG unforgeability. Based on this we recover security of popular classes of message authentication schemes such as MACs (including HMAC and PRF-based MACs) and CW-schemes. Furthermore, in many cases we do so with a TIGHT security reduction, so that in the end the news we bring is surprisingly positive given the initial negative result. Finally, we show analogous results for authenticated encryption.
##### BibTeX
@misc{eprint-2004-12275,
title={The Power of Verification Queries in Message Authentication and Authenticated Encryption},
booktitle={IACR Eprint archive},
keywords={secret-key cryptography / message authentication, authenticated encryption, MAC, PRF},
url={http://eprint.iacr.org/2004/309},
note={ mihir@cs.ucsd.edu 12740 received 16 Nov 2004, last revised 18 Nov 2004},
author={Mihir Bellare and Oded Goldreich and Anton Mityagin},
year=2004
}