Academic Journals Database
Disseminating quality controlled scientific knowledge

On the Security of NMAC and Its Variants

Author(s): Fanbao Liu

ISSN 1693-6930

Volume: 11;
Issue: 2;
Start page: 381;
Date: 2013;
Original page

Keywords: NMAC | Keying Hash Function | Equivalent Key Recovery | MAC Forgery | Birthday Attack.

Based on the three earlier MAC (Message Authentication Code) construction approaches, we propose and analyze some variants of NMAC. We propose some key recovery attacks to these NMAC variants, for example, we can recover the equivalent inner key of NMAC in about $O(2^{n/2})$ MAC operations, in a related key setting. We propose NMAC-E, a variant of NMAC with secret envelop, to achieve more process efficiency and no loss of security, which needs only one call to the underlying hash function, instead of two invocations in HMAC.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions