CBC MACs for arbitrary-length messages: The three-key constructions

We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M {0,1}*using max{1, Γ |M|/nΓ} applications of the underlying n-bit block cipher. Our f...

Full description

Saved in:
Bibliographic Details
Main Authors: Black J., Rogaway P.
Format: Article
Language:English
Published: 2014
Online Access:http://www.scopus.com/inward/record.url?eid=2-s2.0-17444383008&partnerID=40&md5=ae4e8118c141626d65584527d78d206b
http://cmuir.cmu.ac.th/handle/6653943832/4996
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Chiang Mai University
Language: English
id th-cmuir.6653943832-4996
record_format dspace
spelling th-cmuir.6653943832-49962014-08-30T02:56:02Z CBC MACs for arbitrary-length messages: The three-key constructions Black J. Rogaway P. We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M {0,1}*using max{1, Γ |M|/nΓ} applications of the underlying n-bit block cipher. Our favorite construction, XCBC, works like this: if |M| is a positive multiple of n then XOR the n-bit key K2 with the last block of M and compute the CBC MAC keyed with K1; otherwise, extend M's length to the next multiple of n by appending minimal 10ℓ padding (ℓ ≥ 0), XOR the n-bit key K3 with the last block of the padded message, and compute the CBC MAC keyed with K1. We prove the security of this and other constructions, giving concrete bounds on an adversary's inability to forge in terms of his inability to distinguish the block cipher from a random permutation. Our analysis exploits new ideas which simplify proofs compared with prior work. © 2004 International Association for Cryptologic Research. 2014-08-30T02:56:02Z 2014-08-30T02:56:02Z 2005 Article 09332790 10.1007/s00145-004-0016-3 JOCRE http://www.scopus.com/inward/record.url?eid=2-s2.0-17444383008&partnerID=40&md5=ae4e8118c141626d65584527d78d206b http://cmuir.cmu.ac.th/handle/6653943832/4996 English
institution Chiang Mai University
building Chiang Mai University Library
country Thailand
collection CMU Intellectual Repository
language English
description We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and MAC any message M {0,1}*using max{1, Γ |M|/nΓ} applications of the underlying n-bit block cipher. Our favorite construction, XCBC, works like this: if |M| is a positive multiple of n then XOR the n-bit key K2 with the last block of M and compute the CBC MAC keyed with K1; otherwise, extend M's length to the next multiple of n by appending minimal 10ℓ padding (ℓ ≥ 0), XOR the n-bit key K3 with the last block of the padded message, and compute the CBC MAC keyed with K1. We prove the security of this and other constructions, giving concrete bounds on an adversary's inability to forge in terms of his inability to distinguish the block cipher from a random permutation. Our analysis exploits new ideas which simplify proofs compared with prior work. © 2004 International Association for Cryptologic Research.
format Article
author Black J.
Rogaway P.
spellingShingle Black J.
Rogaway P.
CBC MACs for arbitrary-length messages: The three-key constructions
author_facet Black J.
Rogaway P.
author_sort Black J.
title CBC MACs for arbitrary-length messages: The three-key constructions
title_short CBC MACs for arbitrary-length messages: The three-key constructions
title_full CBC MACs for arbitrary-length messages: The three-key constructions
title_fullStr CBC MACs for arbitrary-length messages: The three-key constructions
title_full_unstemmed CBC MACs for arbitrary-length messages: The three-key constructions
title_sort cbc macs for arbitrary-length messages: the three-key constructions
publishDate 2014
url http://www.scopus.com/inward/record.url?eid=2-s2.0-17444383008&partnerID=40&md5=ae4e8118c141626d65584527d78d206b
http://cmuir.cmu.ac.th/handle/6653943832/4996
_version_ 1681420341975449600