In this work, we show that above the birthday bound, hash-based MACs offer significantly less security than previously believed. Our main result is a generic distinguishing-H and state-recovery attack against hash-based MACs with a complexity of only $\tilde O(2^{l/2})$. In addition, we show a key-recovery attack with complexity $\tilde O(2^{3l/4})$ against HMAC used with a hash functions with an internal checksum, such as GOST. This surprising result shows that the use of a checksum might actually weaken a hash function when used in a MAC. We stress that our attacks are generic, and they are in fact more efficient than some previous attacks proposed on MACs instantiated with concrete hash functions.
We use techniques similar to the cycle-detection technique proposed by Peyrin et al. at Asiacrypt 2012 to attack HMAC in the related-key model. However, our attacks works in the single-key model for both HMAC and NMAC, and without restriction on the key size.
Category / Keywords: secret-key cryptography / NMAC, HMAC, hash function, distinguishing-H, key recovery, GOST. Original Publication (with minor differences): IACR-ASIACRYPT-2013 Date: received 31 May 2014 Contact author: thomas peyrin at gmail com Available format(s): PDF | BibTeX Citation Version: 20140602:071310 (All versions of this report) Short URL: ia.cr/2014/406 Discussion forum: Show discussion | Start new discussion