This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining (CBC) mode.
The main results of this paper are on the second-preimage attack on CBC-MAC and CBC-like MACs include TMAC, OMAC, CMAC, PC-MAC and MACs based on three-key ...
Abstract. This paper first presents a new distinguishing attack on the. CBC-MAC structure based on block ciphers in cipher block chaining. (CBC) mode.
Abstract. In this paper, we first present a new distinguisher on the. CBC-MAC based on a block cipher in Cipher Block Chaining (CBC).
Jan 8, 2014 · The attacker playing the distinguishing game announces that the oracle is a random function; else announces that the oracle is CBC-MAC.
A new distinguisher on the CBC-MAC based on a block cipher in Cipher Block Chaining (CBC) mode is presented, which can also be used to distinguish other ...
... Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. That paper says: "The adversary makes 2(n+1)/2 queries with m-block messages that ...
People also ask
What is the difference between preimage attack and second preimage attack?
What is the CBC MAC algorithm?
Feb 26, 2016 · This paper first presents a new distinguishing attack on the CBC-MAC structure based on block ciphers in cipher block chaining (CBC) mode.
In this paper, we present a distinguishing attack and second pre-image attack on specific MAC algorithm based on block cipher, Mini-AES CBC-MAC.
A distinguishing attack and second pre-image attack on specific MAC algorithm based on block cipher, Mini-AES CBC-MAC is presented and it is shown that ...