Cryptology ePrint Archive: Report 2015/477

Authentication Key Recovery in Galois/Counter Mode (GCM)

John Mattsson

Abstract: GCM is used in a vast amount of security protocols and is quickly becoming the de facto mode of operation for block ciphers. In this paper we suggest several novel improvements to Fergusons’s authentication key recovery method and show that for many truncated tag sizes, the security levels are far below, not only the current NIST requirement of 112-bit security, but also the old NIST requirement of 80-bit security. We therefore strongly recommend NIST to make a revision of SP 800-38D.

Category / Keywords: secret-key cryptography / Secret-key Cryptography, Message Authentication Codes, Block Ciphers, Cryptanalysis, Galois/Counter Mode, GCM, Authentication Key Recovery, AES-GCM, Suite B

Date: received 19 May 2015

Contact author: john mattsson at ericsson com

Available format(s): PDF | BibTeX Citation

Version: 20150519:210552 (All versions of this report)

Short URL: ia.cr/2015/477

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]