Academic Journals Database
Disseminating quality controlled scientific knowledge

On the Security of NMAC and Its Variants

ADD TO MY LIST
 
Author(s): Fanbao Liu

Journal: TELKOMNIKA
ISSN 1693-6930

Volume: 11;
Issue: 2;
Start page: 381;
Date: 2013;
Original page

Keywords: NMAC | Keying Hash Function | Equivalent Key Recovery | MAC Forgery | Birthday Attack.

ABSTRACT
Based on the three earlier MAC (Message Authentication Code) construction approaches, we propose and analyze some variants of NMAC. We propose some key recovery attacks to these NMAC variants, for example, we can recover the equivalent inner key of NMAC in about $O(2^{n/2})$ MAC operations, in a related key setting. We propose NMAC-E, a variant of NMAC with secret envelop, to achieve more process efficiency and no loss of security, which needs only one call to the underlying hash function, instead of two invocations in HMAC.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions