期刊文献+

CCTR认证模式的不可证明安全性

Unprovable Security of CCTR Authentication Mode
下载PDF
导出
摘要 消息认证码是现代密码学中用以检验数据完整性和数据起源认证的重要手段.分组密码认证模式是利用分组密码为基础部件来实现认证功能的一种工作模式.安全和效率是消息认证码的设计过程中需要权衡的两个方面.为了提高分组密码认证模式的效率,2009年,黄玉划等人提出了一种基于链接与计数的快速认证模式(CCTR),并从统计评估的角度验证了CCTR模式的安全性.本文利用底层分组密码的特性,分别从实际攻击的角度和可证明安全性的角度对CCTR模式的安全性进行了分析.利用CCTR模式中部分分组密码密钥输入部分可控的特点,我们进行选择消息攻击.两种攻击方法只需对标签生成算法询问一次,就可以伪造成功.研究结果表明:在CCTR模式实际使用中,当所用分组密码具有一个和DES相同的性质时,CCTR模式是不安全的;当所用分组密码是一个有弱密钥的伪随机置换时,CCTR模式也是不安全的.同时表明,原文中CCTR模式的安全性证明是错误的,仅仅在伪随机置换的假设下,不足以证明CCTR模式安全性. Message Authentication Code(MAC) is an important means to verify data integrity and data origin in modern cryptography. Block cipher authentication mode is a MAC based on block cipher. We do trade-off between security and efficiency in designing MAC. In order to improve the efficiency, Huang et al. proposed a MAC using chaining and counter(CCTR) mode and tested its security through statistical evaluation. In this paper, we analyze the security of CCTR by a practical attack and give a counter example against its provable security. We adopt the chosen-message attack by controlling the input of key to some underlying block ciphers. The two successful forgery attacks only need to query the tag-generating algorithm once. We show that CCTR is not secure when using a DES-like block cipher or a block cipher with some weak keys. We also show that the result of provable security about CCTR is wrong since it is insufficient to prove its security under the assumption of pseudorandom permutation(PRP).
作者 李玉玲 王鹏
出处 《密码学报》 CSCD 2016年第4期374-381,共8页 Journal of Cryptologic Research
基金 国家自然科学基金项目(61272477 61472415)
关键词 消息认证码 认证模式 分组密码 伪随机置换 Message Authentication Code authentication mode block cipher Pseudorandom Permutation
  • 相关文献

参考文献19

  • 1SUN Z L,WANG P,ZHANG L T.Weak-key and related-key analysis of hash-counter-hash tweakable enciphering schemes. the 20th Australasian Conference on Information Security and Privacy-ACISP 2015 . 2015
  • 2Mihir Bellare,JoeKilian,Phillip Rogaway.The security of cipher block chaining. Advances in Cryptology-CRYPTO’’94 . 1994
  • 3T.Iwata,,K.Kurosawa.OMAC:One-key CBC MAC. Fast Software Encryption -FSE 2003 . 2003
  • 4Bellare M.New proofs for NMAC and HMAC:Security without collision-resistance. CRYPTO 2006 . 2006
  • 5J Black,S Halevi,H Krawczyk,et al.UMAC:Fast and secure message authentication. Advances in Cryptology—CRYPTO’99 . 1999
  • 6Jian G,Peyrin T,Yu S,et al.Updates on generic attacks against HMAC and NMAC. Advances in CryptologyCRYPTO . 2014
  • 7Tetsu Iwata,Kaoru Kurosawa.On the Correctness of Security Proofs for the 3 GPP Confidentiality and Integrity Algorithms. Cryptography and Coding 2003 . 2003
  • 8T. Iwata,T. Kohno.New security proofs for the 3GPP confidentiality and integrity algorithms. Fast Software Encryption, FSE 2004 . 2004
  • 9Bo Zhu,Yin Tan,Guang Gong.Revisiting MAC forgeries,weak keys and provable security of Galois/counter mode of operation. 12th International Conference on Cryptology and Network Security . 2013
  • 10Bernstein D J.The Poly1305-AES message-authentication code. Fast Software Encryption2005 . 2005

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部