New Proofs for NMAC and HMAC: Security Without Collision-Resistance

HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent attacks show that assumption (2) is false for MD5 and SHA-1, removing the proof-based support for HMAC in these cases....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Bellare, Mihir
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 619
container_issue
container_start_page 602
container_title
container_volume
creator Bellare, Mihir
description HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent attacks show that assumption (2) is false for MD5 and SHA-1, removing the proof-based support for HMAC in these cases. This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known attacks compromise the pseudorandomness of the compression function, and it also helps explain the resistance-to-attack that HMAC has shown even when implemented with hash functions whose (weak) collision resistance is compromised. We also show that an even weaker-than-PRF condition on the compression function, namely that it is a privacy-preserving MAC, suffices to establish HMAC is a secure MAC as long as the hash function meets the very weak requirement of being computationally almost universal, where again the value lies in the fact that known attacks do not invalidate the assumptions made.
doi_str_mv 10.1007/11818175_36
format Book Chapter
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19688005</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19688005</sourcerecordid><originalsourceid>FETCH-LOGICAL-c364t-abed00c13f64a5f96fafec2b01c4465b80fd423cccd64ac7d1c69d1e0616efe63</originalsourceid><addsrcrecordid>eNpNkMtOwzAQRc1LopSu-AFvWLAIzMSOk7CrokKRSkE8xNJyHBsCIa7sVKh_j1GRYGYxM7pHd6RLyAnCOQLkF4hF7DyTTOyQI5ZxYDlnLN8lIxSICWO83PsT0nKfjIBBmpTxOiSTEN4hFsOsAD4i1dJ80XvvnA3UOk-Xt9OKqr6h87hc0kej174dNvSlHd7ceqCV67o2tK5PHkxow6B6bY7JgVVdMJPfOSbPV7Onap4s7q5vquki0UzwIVG1aQA0Miu4ymwprLJGpzWg5lxkdQG24SnTWjcR0HmDWpQNGhAojDWCjcnp1nelglad9fF5G-TKt5_KbySWoigAssidbbkQpf7VeFk79xEkgvyJUP6LkH0DMw9deQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>New Proofs for NMAC and HMAC: Security Without Collision-Resistance</title><source>Springer Books</source><creator>Bellare, Mihir</creator><contributor>Dwork, Cynthia</contributor><creatorcontrib>Bellare, Mihir ; Dwork, Cynthia</creatorcontrib><description>HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent attacks show that assumption (2) is false for MD5 and SHA-1, removing the proof-based support for HMAC in these cases. This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known attacks compromise the pseudorandomness of the compression function, and it also helps explain the resistance-to-attack that HMAC has shown even when implemented with hash functions whose (weak) collision resistance is compromised. We also show that an even weaker-than-PRF condition on the compression function, namely that it is a privacy-preserving MAC, suffices to establish HMAC is a secure MAC as long as the hash function meets the very weak requirement of being computationally almost universal, where again the value lies in the fact that known attacks do not invalidate the assumptions made.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540374329</identifier><identifier>ISBN: 9783540374329</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540374337</identifier><identifier>EISBN: 9783540374336</identifier><identifier>DOI: 10.1007/11818175_36</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Compression Function ; Computer science; control theory; systems ; Cryptographic Hash Function ; Cryptography ; Exact sciences and technology ; Hash Function ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Message Authentication Code ; Security Proof ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Advances in Cryptology - CRYPTO 2006, 2006, p.602-619</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c364t-abed00c13f64a5f96fafec2b01c4465b80fd423cccd64ac7d1c69d1e0616efe63</citedby><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11818175_36$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11818175_36$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,779,780,784,789,790,793,4050,4051,27925,38255,41442,42511</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19688005$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Dwork, Cynthia</contributor><creatorcontrib>Bellare, Mihir</creatorcontrib><title>New Proofs for NMAC and HMAC: Security Without Collision-Resistance</title><title>Advances in Cryptology - CRYPTO 2006</title><description>HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent attacks show that assumption (2) is false for MD5 and SHA-1, removing the proof-based support for HMAC in these cases. This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known attacks compromise the pseudorandomness of the compression function, and it also helps explain the resistance-to-attack that HMAC has shown even when implemented with hash functions whose (weak) collision resistance is compromised. We also show that an even weaker-than-PRF condition on the compression function, namely that it is a privacy-preserving MAC, suffices to establish HMAC is a secure MAC as long as the hash function meets the very weak requirement of being computationally almost universal, where again the value lies in the fact that known attacks do not invalidate the assumptions made.</description><subject>Applied sciences</subject><subject>Compression Function</subject><subject>Computer science; control theory; systems</subject><subject>Cryptographic Hash Function</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Hash Function</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Message Authentication Code</subject><subject>Security Proof</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540374329</isbn><isbn>9783540374329</isbn><isbn>3540374337</isbn><isbn>9783540374336</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2006</creationdate><recordtype>book_chapter</recordtype><recordid>eNpNkMtOwzAQRc1LopSu-AFvWLAIzMSOk7CrokKRSkE8xNJyHBsCIa7sVKh_j1GRYGYxM7pHd6RLyAnCOQLkF4hF7DyTTOyQI5ZxYDlnLN8lIxSICWO83PsT0nKfjIBBmpTxOiSTEN4hFsOsAD4i1dJ80XvvnA3UOk-Xt9OKqr6h87hc0kej174dNvSlHd7ceqCV67o2tK5PHkxow6B6bY7JgVVdMJPfOSbPV7Onap4s7q5vquki0UzwIVG1aQA0Miu4ymwprLJGpzWg5lxkdQG24SnTWjcR0HmDWpQNGhAojDWCjcnp1nelglad9fF5G-TKt5_KbySWoigAssidbbkQpf7VeFk79xEkgvyJUP6LkH0DMw9deQ</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Bellare, Mihir</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>New Proofs for NMAC and HMAC: Security Without Collision-Resistance</title><author>Bellare, Mihir</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c364t-abed00c13f64a5f96fafec2b01c4465b80fd423cccd64ac7d1c69d1e0616efe63</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Compression Function</topic><topic>Computer science; control theory; systems</topic><topic>Cryptographic Hash Function</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Hash Function</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Message Authentication Code</topic><topic>Security Proof</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bellare, Mihir</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bellare, Mihir</au><au>Dwork, Cynthia</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>New Proofs for NMAC and HMAC: Security Without Collision-Resistance</atitle><btitle>Advances in Cryptology - CRYPTO 2006</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2006</date><risdate>2006</risdate><spage>602</spage><epage>619</epage><pages>602-619</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540374329</isbn><isbn>9783540374329</isbn><eisbn>3540374337</eisbn><eisbn>9783540374336</eisbn><abstract>HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent attacks show that assumption (2) is false for MD5 and SHA-1, removing the proof-based support for HMAC in these cases. This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known attacks compromise the pseudorandomness of the compression function, and it also helps explain the resistance-to-attack that HMAC has shown even when implemented with hash functions whose (weak) collision resistance is compromised. We also show that an even weaker-than-PRF condition on the compression function, namely that it is a privacy-preserving MAC, suffices to establish HMAC is a secure MAC as long as the hash function meets the very weak requirement of being computationally almost universal, where again the value lies in the fact that known attacks do not invalidate the assumptions made.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11818175_36</doi><tpages>18</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Advances in Cryptology - CRYPTO 2006, 2006, p.602-619
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19688005
source Springer Books
subjects Applied sciences
Compression Function
Computer science
control theory
systems
Cryptographic Hash Function
Cryptography
Exact sciences and technology
Hash Function
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Message Authentication Code
Security Proof
Signal and communications theory
Software
Telecommunications and information theory
title New Proofs for NMAC and HMAC: Security Without Collision-Resistance
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T05%3A30%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=New%20Proofs%20for%20NMAC%20and%20HMAC:%20Security%20Without%20Collision-Resistance&rft.btitle=Advances%20in%20Cryptology%20-%20CRYPTO%202006&rft.au=Bellare,%20Mihir&rft.date=2006&rft.spage=602&rft.epage=619&rft.pages=602-619&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540374329&rft.isbn_list=9783540374329&rft_id=info:doi/10.1007/11818175_36&rft_dat=%3Cpascalfrancis_sprin%3E19688005%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540374337&rft.eisbn_list=9783540374336&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true