Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
From MaRDI portal
Publication:5459068
DOI10.1007/11935230_3zbMATH Open1172.94571OpenAlexW1866609797MaRDI QIDQ5459068FDOQ5459068
Authors: Scott Contini, Yiqun Lisa Yin
Publication date: 24 April 2008
Published in: Advances in Cryptology – ASIACRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11935230_3
Recommendations
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- On Authentication with HMAC and Non-random Properties
- Generic universal forgery attack on iterative hash-based MACs
Cited In (22)
- New proofs for NMAC and HMAC: security without collision resistance
- Cryptanalysis of a Cayley hash function based on affine maps in one variable over a finite field
- An Integrated ECC-MAC Based on RS Code
- Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
- Collisions of MMO-MD5 and their impact on original MD5
- A simple variant of the Merkle-Damgård scheme with a permutation
- Practical aspects of vertical side-channel analyses on HMAC-SHA-2
- Security of NMAC and HMAC Based on Non-malleability
- Security analysis of randomize-hash-then-sign digital signatures
- Generic Related-Key Attacks for HMAC
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
- Boosting Merkle-Damgård Hashing for Message Authentication
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Multilane HMAC— Security beyond the Birthday Limit
- Second Preimages for Iterated Hash Functions and Their Implications on MACs
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
This page was built for publication: Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5459068)