Skip to main content

Extended Models for Message Authentication

  • Conference paper
Information Security and Cryptology – ICISC 2008 (ICISC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5461))

Included in the following conference series:

Abstract

In recent years, several side channel attacks have been given to some provably secure Message Authentication (MA) schemes. These side channel attacks help adversaries to get some information about secret values (such like internal states) in MA-schemes, which is beyond the original models consider about, so the provable security completely lose. To fix this problem, we extend the original models for message authentication, taking the information about secret values in MA-schemes into account. The extended models can not only provide a framework under which one can discuss security of MA-schemes facing side channel attacks, but also give us an insight view of MA-schemes. As an example, we consider the security of f9 (a MA-scheme in 3GPP) and its variants in an extended model. The result helps us to know f9 better, e.g. how to use it safely and what measures need to be taken in case of potential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Goldreich, O., Mityagin, A.: The Power of Verification Queries in Message Authentication and Authenticated Encryption. Cryptology ePrint Archive: Report 2004/309

    Google Scholar 

  2. Iwata, T., Kohno, T.: New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 427–445. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Preneel, B., van Oorschot, P.: On the Security of Iterated Message Authentication Codes. IEEE Transactions on Information Theory 45(1), 188–199 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  4. Knudsen, L.R., Mitchell, C.J.: Analysis of 3GPP-MAC and Two-Key 3GPP-MAC. Discrete Applied Mathematics 128(1), 181–191 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  5. Okeya, K., Iwata, T.: Side Channel Attacks on Message Authentication Codes. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 205–217. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Okeya, K.: Side Channel Attacks against HMACs based on Block-Cipher based Hash Functions. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 432–443. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Gauravaram, P., Okeya, K.: An Update on the Side Channel Cryptanalysis of MACs based on Cryptographic Hash Functions. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 393–403. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. ETSI TS 35.202 V7.0.0: Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI Specification, http://www.3gpp.org/tb/other/algorithms.htm

  9. ETSI TS 35.201 V7.0.0: Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification, http://www.3gpp.org/tb/other/algorithms.htm

  10. Bellare, M., Kilian, J., Rogaway, P.: The Security of Cipher Block Chaining. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 341–358. Springer, Heidelberg (1994)

    Google Scholar 

  11. Patarin, J.: A Proof of Security in O (2^ n) for the Xor of Two Random Permutations. Cryptology ePrint Archive: Report 2008/010

    Google Scholar 

  12. Zhang, L., Wu, W., Wang, P.: Extended Models for Message Authentication (full vision), available from the authors

    Google Scholar 

  13. Biham, E., Dunkelman, O., Keller, N.: A Related-Key Rectangle Attack on the Full KASUMI. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 443–461. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Kitsos, P., Sklavos, N., Koufopavlou, O.: UMTS Security: System Architecture and Hardware Implementation. Wireless Communications and Mobile Computing 7(4), 483–494 (2007)

    Article  Google Scholar 

  15. Marinis, K., Moshopoulos, N.K., Karoubalis, F., Pekmestzi, K.Z.: On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 248–265. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, L., Wu, W., Wang, P. (2009). Extended Models for Message Authentication. In: Lee, P.J., Cheon, J.H. (eds) Information Security and Cryptology – ICISC 2008. ICISC 2008. Lecture Notes in Computer Science, vol 5461. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00730-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00730-9_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00729-3

  • Online ISBN: 978-3-642-00730-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics