Paper 2005/088

The MAC function Pelican 2.0

Joan Daemen and Vincent Rijmen

Abstract

We present an update of the Pelican MAC function, called Pelican 2.0. Both versions have the Alred construction and are based on Rijndael. they are a factor 2.5 more efficient than CBC-MAC with Rijndael, while providing a comparable claimed security level. The difference between Pelican 2.0 and the original version is that the initial value changes from the all-zero string to another constant. The reason for this is the negative impact on security if key check values are available computed with a certain standard key check value algorithm that applies the block cipher to the zero string and takes as key check value its truncated output. The security impact of this on a number of standard MACs is studied in Cryptology ePrint Archive Report 2014/183 and the analysis carries over for Pelican.

Note: See abstract

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown status
Keywords
AESmessage authentication codes
Contact author(s)
jda @ noekeon org
History
2014-04-23: revised
2005-03-22: received
See all versions
Short URL
https://ia.cr/2005/088
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/088,
      author = {Joan Daemen and Vincent Rijmen},
      title = {The MAC function Pelican 2.0},
      howpublished = {Cryptology ePrint Archive, Paper 2005/088},
      year = {2005},
      note = {\url{https://eprint.iacr.org/2005/088}},
      url = {https://eprint.iacr.org/2005/088}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.