Cryptology ePrint Archive: Report 2012/684

Generic Related-key Attacks for HMAC

Thomas Peyrin and Yu Sasaki and Lei Wang

Abstract: In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single related-key) for the HMAC construction. When HMAC uses a k-bit key, outputs an n-bit MAC, and is instantiated with an l-bit inner iterative hash function processing m-bit message blocks where m=k, our distinguishing-R attack requires about 2^{n/2} queries which improves over the currently best known generic attack complexity 2^{l/2} as soon as l>n. This means that contrary to the general belief, using wide-pipe hash functions as internal primitive will not increase the overall security of HMAC in the related-key model when the key size is equal to the message block size. We also present generic related-key distinguishing-H, internal state recovery and forgery attacks. Our method is new and elegant, and uses a simple cycle-size detection criterion. The issue in the HMAC construction (not present in the NMAC construction) comes from the non-independence of the two inner hash layers and we provide a simple patch in order to avoid this generic attack. Our work finally shows that the choice of the opad and ipad constants value in HMAC is important.

Category / Keywords: secret-key cryptography / HMAC, hash function, distinguisher, forgery, related-key.

Publication Info: Extended version of the Asiacrypt 2012 article

Date: received 4 Dec 2012, last revised 17 Jul 2013

Contact author: thomas peyrin at gmail com

Available format(s): PDF | BibTeX Citation

Note: We noticed an independent work by Dodis et al., and interestingly these two papers complement each other.

Version: 20130718:043031 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]