




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、Generic Attacks against MACs( (消息認(rèn)證碼的安全分析消息認(rèn)證碼的安全分析) )Lei WangLab of Cryptography and Computer Security (LoCCS)Shanghai Jiao Tong UniversityChinaCrypt 2015Modern Cryptography Main objectives: confidentiality; authenticity Applications of authenticity email signature, credit cards, software update, e
2、tc. Cryptographic protocols of authenticity asymmetric-key: digital signature; symmetric-key: message authentication code (MAC)MAC Symmetric-key: Alice and Bob share secret key before communications. Provide authenticity and integrity: Bob verifies if T=T holds.AliceBobM T(M, T)MMACKMACK TSecurity N
3、otions Key recovery: extract the key of MAC Forgery: forge a valid (M, T) for a MAC existential forgery: M is chosen by attacker after interaction; selective forgery: M is chosen by attacker before interaction; universal forgery: M is given to attacker before interaction; Distinguishers distinguishi
4、ng-R: distinguish MACH from a random function (RF); distinguishing-H: distinguish MACH from MACRFSecurity Evaluation Provable security reduction-based: assume underlying primitive is secure. lower bound of MAC Generic attack attacks work for any choice of underlying primitive. upper bound of MACHow
5、to Build MAC Hash function based HMAC, Sandwich-MAC, Envelope-MAC Block cipher based CBC MAC, CMAC, PMAC Universal hash function based UMAC, VMAC, Poly1305 Dedicated design SQUASH, SipHash, PelicanRemaining of this Talk Hash function based HMAC, Sandwich-MAC, Envelope-MAC Block cipher based CBC MAC,
6、 CMAC, PMAC Universal hash function based UMAC, VMAC, Poly1305 Dedicated design SQUASH, SipHash, PelicanOutlook Introduction hash-based MAC known results Functional-graph-based attacks functional graph related-key attacks single-key attacks ConclusionCryptographic Hah Function Map arbitrary-length d
7、ata to short random digest Digest acts as fingerprint of original datadata256/512-bit digestIterative Hash Function CF: fixed-input-length compression function CF: finalization functionIterative Hash Based MACNotable Example: HMAC Designed by Bellare et al. BCK96 Standardized by ANSI, ETF, ISO, NIST
8、 Wide applications, beyond mere MAC authentication: SSL, IPSec; identification: POP3, IMAP; key-derivation: IPSec, TLS.Notable Example: HMAC13Provable SecurityGeneric Attack: Internal-Collision-Basedcollision15Results on Hash-based MACs until 2012: internal collision based attackSecurity proof(lower
9、 bound)Generic attack(upper bound)Distinguishing-RtightDistinguishing-HExistential forgerytightSelective forgeryUniversal forgeryKey recoveryResults on Hash-based MACs since 2012: functional graph based attacksSecurity proof(lower bound)Generic attack(upper bound)Distinguishing-RtightDistinguishing-
10、HtightExistential forgerytightSelective forgerytightUniversal forgeryKey recoveryOutlook Introduction hash-based MAC known results Functional-graph-based attacks functional graph related-key attacks single-key attacks Other generic attacks ConclusionFunctional Graph n-bit to n-bit function F can be
11、represented as a graph iteratively compute #components: #nodes: #cycle nodes: longest path: largest components Distinguishing-R Attacks on HMACRelated-Key Dis-R on HMAC PSW12 HMACKHMACKEquivalent HMACK HMACKCompare HMACK and HMACK HMACKHMACKCompare HMACK and HMACK HMACKHMACKNotation SimplificationNo
12、tation Simplification Essential Observations in PSW12 HMACK and HMACK have highly similar functional graph. In particular, the cycle in largest component has the same length.Related-Key Dis-R on HMAC PSW12 Ideal: compare the cycle length of the largest component Attack procedure:1. Select a random v
13、alue X, iteratively query to get a cycle, denote its length as L.2. Similarly get a cycle length L for 3. Compare if L=L yes: is (MACK, MACK) no: are (R, R) Related-Key Dis-R on HMAC PSW12Application to Other Notions PSW12Outlook Introduction hash-based MAC known results Functional-graph-based attac
14、ks functional graph related-key attacks single-key attacks Other generic attacks ConclusionDis-H Attack on Hash-based MACs?How to Exploit Functional GraphTechnical Novelty in LPW13 Construct a pair of messages: equal length: padding issue; collide at the internal state with a high probability;Collid
15、ing Message Pair in LPW13 Enter cycle twice to have equal length. Colliding Message Pair in LPW13Colliding Message Pair in LPW13Colliding Message Pair in LPW13 Jump out from the cycle loop.Colliding Message Pair in LPW13 Re-enter the cycle of largest componentColliding Message Pair in LPW13 Loop ins
16、ide cycle again, and output collide. Colliding Message Pair in LPW13 Final outputs collide, since two messages have equal length.Colliding Message Pair in LPW13 Overall, this message pair collide with a constant probability. Dis-H Attack in LPW13Dis-H Attack in LPW13Selective Forgery GPSW14Universal
17、 Forgery on Hash-Based MACs46Difficulty of Universal ForgeryCan We Derive More Information?Can We Derive More Information? Yes, we can!Can We Derive More Information?cycle node?50What is Interesting Information?cycle node!Universal Forgery PW14, GPSW141000001232Universal Forgery PW14, GPSW14Universa
18、l Forgery PW14, GPSW14 Phase 2: construct a second preimage to forge second preimage attack on iterative hash function KS05 query collisionOther Functional-Graph Based AttacksPre-computationTimeMemoryHellmans tradeoffdivide-and-recoverGPSW14Outlook Introduction hash-based MAC known results Functional-graph-based attacks functional graph related-key attacks single-key attacks
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 課題申報書課題進(jìn)度
- 前臺薪資合同范本模板
- 廈門 代建合同范本
- 公司頂層設(shè)計合同范本
- 傷殘賠償合同范本
- 品牌使用授權(quán)合同范本
- 保安與個人合同范本
- 廠房墻面翻新合同范例
- 樂器維修采購合同范例
- 合同范本合作期限
- Unit-3-Reading-and-thinking課文詳解課件-高中英語人教版必修第二冊
- 肝病科進(jìn)修總結(jié)匯報
- 銀行承兌匯票業(yè)務(wù)講義
- 化妝品企業(yè)質(zhì)量管理手冊
- 建筑工程施工日志模板
- 【高中語文】《社會歷史的決定性基礎(chǔ)》課件49張+統(tǒng)編版+選擇性必修中冊
- oecd 稅收協(xié)定范本
- 切爾諾貝利核電站事故工程倫理分析
- 汽車網(wǎng)絡(luò)安全運(yùn)營中心(VSOC)白皮書-2023.09
- GB/T 31402-2023塑料和其他無孔材料表面抗菌活性的測定
- 大灰狼兒童睡前故事大全
評論
0/150
提交評論