军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-15 共查到密码学 HMAC相关记录16条 . 查询时间(0.082 秒)
Backdoored Hash Functions: Immunizing HMAC and HKDF     hash functions  backdoors  malicious hashing       font style='font-size:12px;'> 2018/4/19
Security of cryptographic schemes is traditionally measured as the inability of resource-constrained adversaries to violate a desired security goal. The security argument usually relies on a sound des...
PBKDF2 [27] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case ...
The Exact PRF-Security of NMAC and HMAC     Message authentication codes  pseudorandom functions  NMAC       font style='font-size:12px;'> 2016/1/8
NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a variable input-length function. A practical single-key variant of NMAC called HMAC is a very popular and wid...
A main contribution of this paper is an improved analysis against HMAC instantiating with reduced Whirlpool. It recovers equivalent keys, which are often denoted as Kin and Kout, of HMAC with 7-round ...
Cryptanalysis of HMAC/NMAC-Whirlpool     HMAC  NMAC  Whirlpool       font style='font-size:12px;'> 2016/1/4
In this paper, we present universal forgery and key recovery attacks on the most popular hash-based MAC constructions, e.g., HMAC and NMAC, instantiated with an AES-like hash function Whirlpool. The...
Generic Security of NMAC and HMAC with Input Whitening     message authentication codes  HMAC  generic attacks       font style='font-size:12px;'> 2015/12/23
HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more generally, a PRF) from a cryptographic hash function. Despite nearly two decades of research, their exact securi...
The security of HMAC is proven under the assumption that its compression function is a dual PRF, meaning a PRF when keyed by either of its two inputs. But, not only do we not know whether particular...
We show that the second iterate H^2(M) = H(H(M)) of a random oracle H cannot achieve strong security in the sense of indifferentiability from a random oracle. We do so by proving that indifferentiabil...
A Closer Look at HMAC     secret-key cryptography / HMAC  cascade       font style='font-size:12px;'> 2013/4/18
Bellare, Canetti and Krawczyk~\cite{FOCS:BelCanKra96} show that cascading an $\eps$-secure (fixed input length) PRF gives an $O(\eps n q)$-secure (variable input length) PRF when making at most $q$ pr...
A Full Key Recovery Attack on HMAC-AURORA-512     AURORA  DMMD  HMAC  Key recovery attack       font style='font-size:12px;'> 2009/6/12
In this note, we present a full key recovery attack on HMACAURORA- 512 when 512-bit secret keys are used and the MAC length is 512-bit long. Our attack requires 2257 queries and the off-line complex...
Kim et al. [4] and Contini et al. [3] studied on the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Especially, they considered the distinguishing attacks. However, they did n...
In this paper, we present new security proofs of well-known hash constructions NMAC/HMAC proposed by Bellare et al. in 1996. We show that block ciphers should be used in hash functions in another way ...
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
On Authentication with HMAC and Non-Random Properties     Authentication  HMAC  Non-Random Properties       font style='font-size:12px;'> 2008/12/15
MAC algorithms can provide cryptographically secure authen- tication services. One of the most popular algorithms in commercial appli- cations is HMAC based on the hash functions MD5 or SHA-1. In t...
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1     HMAC  NMAC  HAVAL  MD4  MD5  SHA-0  SHA-1       font style='font-size:12px;'> 2008/11/25
HMAC is a widely used message authentication code and a pseudorandom function generator based on cryptographic hash functions such as MD5 and SHA-1. It has been standardized by ANSI, IETF, ISO and N...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...