Paper 2012/058
Key recycling in authentication
Christopher Portmann
Abstract
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary.
Since their proof is not composable, we revisit it using a universally composable framework. It turns out that the above argument is insufficient: information about the hash function is in fact leaked in every round to the adversary, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small, and Wegman and Carter's protocol is still
Note: Corrected typos, updated introduction and references.
Metadata
- Available format(s)
-
PDF PS
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- authenticationcomposability
- Contact author(s)
- chportma @ gmail com
- History
- 2012-05-31: revised
- 2012-02-10: received
- See all versions
- Short URL
- https://ia.cr/2012/058
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/058, author = {Christopher Portmann}, title = {Key recycling in authentication}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/058}, year = {2012}, url = {https://eprint.iacr.org/2012/058} }