A double-piped mode of operation for MACs, PRFs and PROs: Security beyond the birthday barrier

15Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We revisit the double-pipe construction introduced by Lucks at Asiacrypt 2005. Lucks originally studied the construction for iteratedhash functions and showed that the approach is effective in improving security against various types of collision and (second-)preimage attacks. Instead, in this paper we apply the construction to the secret-key setting, where the underlying FIL (fixed-input-length) compression function is equipped with a dedicated key input. We make some adjustments to Lucks' original design so that now the new mode works with a single key and operates as a multi-property-preserving domain extension of MACs (message authentication codes), PRFs (pseudo-random functions) and PROs (pseudo-random oracles). Though more than twice as slow as the Merkle-Damgard construction, the double-piped mode enjoys security strengthened beyond the birthday bound, most notably, high MAC security. More specifically, when iterating an FIL-MAC whose output size is n-bit, the new double-piped mode yiel ds an AIL-(arbitrary-inputlength-) MAC with security up to O(2 5n/6) query complexity. This bound contrasts sharply with the birthday bound of O(2n/2), which has been the best MAC security accomplished by earlier constructions. © International Association for Cryptologic Research 2009.

Cite

CITATION STYLE

APA

Yasuda, K. (2009). A double-piped mode of operation for MACs, PRFs and PROs: Security beyond the birthday barrier. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5479 LNCS, pp. 242–259). https://doi.org/10.1007/978-3-642-01001-9_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free