Currently displaying 1 – 1 of 1

Showing per page

Order by Relevance | Title | Year of publication

A tight bound for exhaustive key search attacks against Message Authentication Codes

Vinícius G. P. de SÁDavidson R. BoccardoLuiz Fernando RustRaphael C. S. Machado — 2013

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key: from a set...

Page 1

Download Results (CSV)