TY - GEN
T1 - On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
AU - Kim, Jongsimg
AU - Biryukov, Alex
AU - Preneel, Bart
AU - Hong, Seokhie
PY - 2006
Y1 - 2006
N2 - HMAC is a widely used message authentication code and a pseudorandom function generator based on cryptographic hash functions such as MD5 and SHA-1. It has been standardized by ANSI, IETF, ISO and NIST. HMAC is proved to be secure as long as the compression function of the underlying hash function is a pseudorandom function. In this paper we devise two new distinguishers of the structure of HMAC, called differential and rectangle distinguishers, and use them to discuss the security of HMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. We show how to distinguish HMAC with reduced or full versions of these cryptographic hash functions from a random function or from HMAC with a random function. We also show how to use our differential distinguisher to devise a forgery attack on HMAC. Our distinguishing and forgery attacks can also be mounted on NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1.
AB - HMAC is a widely used message authentication code and a pseudorandom function generator based on cryptographic hash functions such as MD5 and SHA-1. It has been standardized by ANSI, IETF, ISO and NIST. HMAC is proved to be secure as long as the compression function of the underlying hash function is a pseudorandom function. In this paper we devise two new distinguishers of the structure of HMAC, called differential and rectangle distinguishers, and use them to discuss the security of HMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. We show how to distinguish HMAC with reduced or full versions of these cryptographic hash functions from a random function or from HMAC with a random function. We also show how to use our differential distinguisher to devise a forgery attack on HMAC. Our distinguishing and forgery attacks can also be mounted on NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1.
UR - http://www.scopus.com/inward/record.url?scp=33750029023&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33750029023&partnerID=8YFLogxK
U2 - 10.1007/11832072_17
DO - 10.1007/11832072_17
M3 - Conference contribution
AN - SCOPUS:33750029023
SN - 3540380809
SN - 9783540380801
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 242
EP - 256
BT - Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings
PB - Springer Verlag
T2 - 5th International Conference on Security and Cryptography for Networks, SCN 2006
Y2 - 6 September 2006 through 8 September 2006
ER -