Paper 2012/684

Generic Related-key Attacks for HMAC

Thomas Peyrin, Yu Sasaki, and Lei Wang

Abstract

In this article we describe new generic distinguishing and forgery attacks in the related-key scenario (using only a single related-key) for the HMAC construction. When HMAC uses a k-bit key, outputs an n-bit MAC, and is instantiated with an l-bit inner iterative hash function processing m-bit message blocks where m=k, our distinguishing-R attack requires about 2^{n/2} queries which improves over the currently best known generic attack complexity 2^{l/2} as soon as l>n. This means that contrary to the general belief, using wide-pipe hash functions as internal primitive will not increase the overall security of HMAC in the related-key model when the key size is equal to the message block size. We also present generic related-key distinguishing-H, internal state recovery and forgery attacks. Our method is new and elegant, and uses a simple cycle-size detection criterion. The issue in the HMAC construction (not present in the NMAC construction) comes from the non-independence of the two inner hash layers and we provide a simple patch in order to avoid this generic attack. Our work finally shows that the choice of the opad and ipad constants value in HMAC is important.

Note: We noticed an independent work by Dodis et al., and interestingly these two papers complement each other.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Extended version of the Asiacrypt 2012 article
Keywords
HMAChash functiondistinguisherforgeryrelated-key.
Contact author(s)
thomas peyrin @ gmail com
History
2013-07-18: last of 2 revisions
2012-12-10: received
See all versions
Short URL
https://ia.cr/2012/684
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/684,
      author = {Thomas Peyrin and Yu Sasaki and Lei Wang},
      title = {Generic Related-key Attacks for {HMAC}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/684},
      year = {2012},
      url = {https://eprint.iacr.org/2012/684}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.