Paper 2023/1431

Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs

Yaobin Shen, UCLouvain, Belgium
François-Xavier Standaert, UCLouvain, Belgium
Lei Wang, Shanghai Jiao Tong University, China
Abstract

At CRYPTO'18, Datta et al. proposed nPolyMAC and proved the security up to 2^{2n/3} authentication queries and 2^{n} verification queries. At EUROCRYPT'19, Dutta et al. proposed CWC+ and showed the security up to 2^{2n/3} queries. At FSE'19, Datta et al. proposed PolyMAC and its key-reduced variant 2k-PolyMAC, and showed the security up to 2^{2n/3} queries. This security bound was then improved by Kim et al. (EUROCRYPT'20) and Datta et al (FSE'23) respectively to 2^{3n/4} and in the multi-user setting. At FSE'20, Chakraborti et al. proposed PDM*MAC and 1k-PDM*MAC and showed the security up to 2^{2n/3} queries. Recently, Chen et al. proposed nEHtM_p^+ and showed the security up to 2^{2n/3} queries. In this paper, we show forgery attacks on nPolyMAC, CWC+, PolyMAC, 2k-PolyMAC, PDM*MAC, 1k-PDM*MAC and nEHtM_p^+. Our attacks exploit some vulnerability in the underlying polynomial hash function Poly, and (i) require only one authentication query and one verification query; (ii) are nonce-respecting; (iii) succeed with probability 1. Thus, our attacks disprove the provable high security claims of these schemes. We then revisit their security analyses and identify what went wrong. Finally, we propose two solutions that can restore the beyond-birthday-bound security.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published by the IACR in ASIACRYPT 2023
Keywords
Message authentication codeBeyond-birthday-bound securityPolynomial hash functionForgery attack
Contact author(s)
yaobin shen @ uclouvain be
fstandae @ uclouvain be
wanglei_hb @ sjtu edu cn
History
2023-09-24: approved
2023-09-21: received
See all versions
Short URL
https://ia.cr/2023/1431
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1431,
      author = {Yaobin Shen and François-Xavier Standaert and Lei Wang},
      title = {Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1431},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1431}},
      url = {https://eprint.iacr.org/2023/1431}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.