14 research outputs found

    An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol

    Get PDF
    Much research has focused on providing RFID tags with lightweight cryptographic functionality. The HB+ authentication protocol was recently proposed and claimed to be secure against both passive and active attacks. In this note we propose a linear-time active attack against HB+

    D.STVL.9 - Ongoing Research Areas in Symmetric Cryptography

    Get PDF
    This report gives a brief summary of some of the research trends in symmetric cryptography at the time of writing (2008). The following aspects of symmetric cryptography are investigated in this report: • the status of work with regards to different types of symmetric algorithms, including block ciphers, stream ciphers, hash functions and MAC algorithms (Section 1); • the algebraic attacks on symmetric primitives (Section 2); • the design criteria for symmetric ciphers (Section 3); • the provable properties of symmetric primitives (Section 4); • the major industrial needs in the area of symmetric cryptography (Section 5)

    Ongoing Research Areas in Symmetric Cryptography

    Get PDF
    This report is a deliverable for the ECRYPT European network of excellence in cryptology. It gives a brief summary of some of the research trends in symmetric cryptography at the time of writing. The following aspects of symmetric cryptography are investigated in this report: • the status of work with regards to different types of symmetric algorithms, including block ciphers, stream ciphers, hash functions and MAC algorithms (Section 1); • the recently proposed algebraic attacks on symmetric primitives (Section 2); • the design criteria for symmetric ciphers (Section 3); • the provable properties of symmetric primitives (Section 4); • the major industrial needs in the area of symmetric cryptography (Section 5)

    Galois MAC with forgery probability close to ideal

    No full text
    In this note we would like to address an issue brought into discussion in [Ferguson]. In their response [McGrew-Viega] the authors successfully defended their design against Ferguson's concerns. However, there is one issue which still remains: for longer messages the forgery probability of Galois MACs is far from being ideal. In the GCM specification this problem is taken care of by setting an upper bound to the message length and discouraging the use of tags less than 64 bits long. While this removes the problem in practice, the range of application of GCM mode will be limited and the theoretical problem remains unsolved
    corecore