We begin by devising the first state-recovery attack on HMAC with a HAIFA hash function (using a block counter in every compression function call), with complexity $2^{4\ell/5}$. Then, we describe improved trade-offs between the message length and the complexity of a state-recovery attack on HMAC. Consequently, we obtain improved attacks on several HMAC constructions used in practice, in which the hash functions limit the maximal message length (e.g., SHA-1 and SHA-2). Finally, we present the first universal forgery attacks, which can be applied with short message queries to the MAC oracle. In particular, we devise the first universal forgery attacks applicable to SHA-1 and SHA-2.
Category / Keywords: secret-key cryptography / Hash functions, MAC, HMAC, Merkle-Damgård, HAIFA, state-recovery attack, universal forgery attack, Gost, Streebog, SHA family. Original Publication (with major differences): IACR-CRYPTO-2014 Date: received 10 Jun 2014, last revised 14 Jun 2014 Contact author: gaetan leurent at normalesup org Available format(s): PDF | BibTeX Citation Version: 20140614:180204 (All versions of this report) Short URL: ia.cr/2014/441 Discussion forum: Show discussion | Start new discussion