Presentation 2013-07-19
Attacks on Authenticated Encryption Based on ε-MACs
Hayato KOBAYASHI, Hiraku MORITA, Tetsu IWATA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) An Authenticated Encryption (AE) scheme guarantees both privacy and authenticity of data. Alomair proposed a new message authentication code called ε-MAC at ICISC 2010. ε-MAC is designed to be used as a component in the construction of generic AE schemes. It was claimed that its optimized computation improves the efficiency of the entire AE scheme. Moreover, Alomair claimed that an AE scheme based on ε-MAC is provably secure if the encryption algorithm used in the AE scheme satisfies a certain security requirement. However, in this paper, we present forgery attack and distinguishing attack from random bits by exploiting the fact that the prime number used in ε-MAC is smaller than the maximum value represented by one block. Furthermore, Alomair claimed that it is possible to construct an AE scheme providing INT-CTXT, but we point out that the scheme based on ε-MAC cannot be secure in terms of confidentiality.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) ε-MAC / Authenticated Encryption scheme / MAC / forgery attack / distinguishing attack
Paper # ISEC2013-50,SITE2013-45,ICSS2013-55,EMM2013-52
Date of Issue

Conference Information
Committee ISEC
Conference Date 2013/7/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Attacks on Authenticated Encryption Based on ε-MACs
Sub Title (in English)
Keyword(1) ε-MAC
Keyword(2) Authenticated Encryption scheme
Keyword(3) MAC
Keyword(4) forgery attack
Keyword(5) distinguishing attack
1st Author's Name Hayato KOBAYASHI
1st Author's Affiliation Dept. of Computational Science and Engineering, Nagoya University()
2nd Author's Name Hiraku MORITA
2nd Author's Affiliation Dept. of Computational Science and Engineering, Nagoya University
3rd Author's Name Tetsu IWATA
3rd Author's Affiliation Dept. of Computational Science and Engineering, Nagoya University
Date 2013-07-19
Paper # ISEC2013-50,SITE2013-45,ICSS2013-55,EMM2013-52
Volume (vol) vol.113
Number (no) 135
Page pp.pp.-
#Pages 8
Date of Issue