




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Generic Attacks against MACs( (消息認(rèn)證碼的安全分析消息認(rèn)證碼的安全分析) )Lei WangLab of Cryptography and Computer Security (LoCCS)Shanghai Jiao Tong UniversityChinaCrypt 2015Modern Cryptography Main objectives: confidentiality; authenticity Applications of authenticity email signature, credit cards, software update, e
2、tc. Cryptographic protocols of authenticity asymmetric-key: digital signature; symmetric-key: message authentication code (MAC)MAC Symmetric-key: Alice and Bob share secret key before communications. Provide authenticity and integrity: Bob verifies if T=T holds.AliceBobM T(M, T)MMACKMACK TSecurity N
3、otions Key recovery: extract the key of MAC Forgery: forge a valid (M, T) for a MAC existential forgery: M is chosen by attacker after interaction; selective forgery: M is chosen by attacker before interaction; universal forgery: M is given to attacker before interaction; Distinguishers distinguishi
4、ng-R: distinguish MACH from a random function (RF); distinguishing-H: distinguish MACH from MACRFSecurity Evaluation Provable security reduction-based: assume underlying primitive is secure. lower bound of MAC Generic attack attacks work for any choice of underlying primitive. upper bound of MACHow
5、to Build MAC Hash function based HMAC, Sandwich-MAC, Envelope-MAC Block cipher based CBC MAC, CMAC, PMAC Universal hash function based UMAC, VMAC, Poly1305 Dedicated design SQUASH, SipHash, PelicanRemaining of this Talk Hash function based HMAC, Sandwich-MAC, Envelope-MAC Block cipher based CBC MAC,
6、 CMAC, PMAC Universal hash function based UMAC, VMAC, Poly1305 Dedicated design SQUASH, SipHash, PelicanOutlook Introduction hash-based MAC known results Functional-graph-based attacks functional graph related-key attacks single-key attacks ConclusionCryptographic Hah Function Map arbitrary-length d
7、ata to short random digest Digest acts as fingerprint of original datadata256/512-bit digestIterative Hash Function CF: fixed-input-length compression function CF: finalization functionIterative Hash Based MACNotable Example: HMAC Designed by Bellare et al. BCK96 Standardized by ANSI, ETF, ISO, NIST
8、 Wide applications, beyond mere MAC authentication: SSL, IPSec; identification: POP3, IMAP; key-derivation: IPSec, TLS.Notable Example: HMAC13Provable SecurityGeneric Attack: Internal-Collision-Basedcollision15Results on Hash-based MACs until 2012: internal collision based attackSecurity proof(lower
9、 bound)Generic attack(upper bound)Distinguishing-RtightDistinguishing-HExistential forgerytightSelective forgeryUniversal forgeryKey recoveryResults on Hash-based MACs since 2012: functional graph based attacksSecurity proof(lower bound)Generic attack(upper bound)Distinguishing-RtightDistinguishing-
10、HtightExistential forgerytightSelective forgerytightUniversal forgeryKey recoveryOutlook Introduction hash-based MAC known results Functional-graph-based attacks functional graph related-key attacks single-key attacks Other generic attacks ConclusionFunctional Graph n-bit to n-bit function F can be
11、represented as a graph iteratively compute #components: #nodes: #cycle nodes: longest path: largest components Distinguishing-R Attacks on HMACRelated-Key Dis-R on HMAC PSW12 HMACKHMACKEquivalent HMACK HMACKCompare HMACK and HMACK HMACKHMACKCompare HMACK and HMACK HMACKHMACKNotation SimplificationNo
12、tation Simplification Essential Observations in PSW12 HMACK and HMACK have highly similar functional graph. In particular, the cycle in largest component has the same length.Related-Key Dis-R on HMAC PSW12 Ideal: compare the cycle length of the largest component Attack procedure:1. Select a random v
13、alue X, iteratively query to get a cycle, denote its length as L.2. Similarly get a cycle length L for 3. Compare if L=L yes: is (MACK, MACK) no: are (R, R) Related-Key Dis-R on HMAC PSW12Application to Other Notions PSW12Outlook Introduction hash-based MAC known results Functional-graph-based attac
14、ks functional graph related-key attacks single-key attacks Other generic attacks ConclusionDis-H Attack on Hash-based MACs?How to Exploit Functional GraphTechnical Novelty in LPW13 Construct a pair of messages: equal length: padding issue; collide at the internal state with a high probability;Collid
15、ing Message Pair in LPW13 Enter cycle twice to have equal length. Colliding Message Pair in LPW13Colliding Message Pair in LPW13Colliding Message Pair in LPW13 Jump out from the cycle loop.Colliding Message Pair in LPW13 Re-enter the cycle of largest componentColliding Message Pair in LPW13 Loop ins
16、ide cycle again, and output collide. Colliding Message Pair in LPW13 Final outputs collide, since two messages have equal length.Colliding Message Pair in LPW13 Overall, this message pair collide with a constant probability. Dis-H Attack in LPW13Dis-H Attack in LPW13Selective Forgery GPSW14Universal
17、 Forgery on Hash-Based MACs46Difficulty of Universal ForgeryCan We Derive More Information?Can We Derive More Information? Yes, we can!Can We Derive More Information?cycle node?50What is Interesting Information?cycle node!Universal Forgery PW14, GPSW141000001232Universal Forgery PW14, GPSW14Universa
18、l Forgery PW14, GPSW14 Phase 2: construct a second preimage to forge second preimage attack on iterative hash function KS05 query collisionOther Functional-Graph Based AttacksPre-computationTimeMemoryHellmans tradeoffdivide-and-recoverGPSW14Outlook Introduction hash-based MAC known results Functional-graph-based attacks functional graph related-key attacks single-key attacks
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 四川省成都市崇慶中學(xué)2024-2025學(xué)年初三5月階段性檢測(cè)試題語文試題含解析
- 內(nèi)蒙古化工職業(yè)學(xué)院《生物工程專業(yè)綜合實(shí)驗(yàn)》2023-2024學(xué)年第二學(xué)期期末試卷
- 浙江宇翔職業(yè)技術(shù)學(xué)院《機(jī)器人技術(shù)實(shí)踐創(chuàng)新》2023-2024學(xué)年第二學(xué)期期末試卷
- 湛江市年模擬數(shù)學(xué)試題(二)
- 輪胎倉庫消防安全培訓(xùn)
- 2025電子商務(wù)運(yùn)營(yíng)技術(shù)外包服務(wù)合同(乙方提供)
- 2025大連市家具銷售合同范本
- 2025租賃合同-汽車租賃合同
- 2025標(biāo)準(zhǔn)租賃合同范本全新版
- 2025年廣州市房屋租賃合同書范本
- CT設(shè)備維保項(xiàng)目實(shí)施方案
- 約克冷水機(jī)組年度維護(hù)保養(yǎng)方案
- 醫(yī)院年度文化建設(shè)工作方案范文
- 吊裝式風(fēng)機(jī)安裝作業(yè)指導(dǎo)書
- 物資拆裝搬運(yùn)服務(wù)方案
- 高一數(shù)學(xué)分層訓(xùn)練AB卷(人教A版2019必修第二冊(cè))第九章統(tǒng)計(jì)(知識(shí)通關(guān)詳解)【單元測(cè)試卷】(原卷版+解析)
- 培養(yǎng)自我認(rèn)知能力-心理健康教案
- 第九屆全國(guó)大學(xué)生測(cè)井技能大賽備賽試題庫-上(單選題)
- 建筑制圖與識(shí)圖教學(xué)課件:第八章 結(jié)構(gòu)施工圖
- 《全面風(fēng)險(xiǎn)管理報(bào)告》模本-模范本
- 2024年甘肅酒泉肅州區(qū)選拔項(xiàng)目人員納入編制管理107人高頻考題難、易錯(cuò)點(diǎn)模擬試題(共500題)附帶答案詳解
評(píng)論
0/150
提交評(píng)論