Paper 2005/088

The MAC function Pelican 2.0

Joan Daemen and Vincent Rijmen


We present an update of the Pelican MAC function, called Pelican 2.0. Both versions have the Alred construction and are based on Rijndael. they are a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. The difference between Pelican 2.0 and the original version is that the initial value changes from the all-zero string to another constant. The reason for this is the negative impact on security if key check values are available computed with a certain standard key check value algorithm that applies the block cipher to the zero string and takes as key check value its truncated output. The security impact of this on a number of standard MACs is studied in Cryptology ePrint Archive Report 2014/183 and the analysis carries over for Pelican.

Note: See abstract

Available format(s)
Publication info
Published elsewhere. Unknown status
AESmessage authentication codes
Contact author(s)
jda @ noekeon org
2014-04-23: revised
2005-03-22: received
See all versions
Short URL
Creative Commons Attribution


      author = {Joan Daemen and Vincent Rijmen},
      title = {The MAC function Pelican 2.0},
      howpublished = {Cryptology ePrint Archive, Paper 2005/088},
      year = {2005},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.