Distinguishing attacks on LPMAC based on the full RIPEMD and reduced-step RIPEMD-{256,320}

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

This paper presents the first distinguishing attack on the LPMAC based on RIPEMD, 58-step reduced RIPEMD-256 and 48-step reduced RIPEMD-320, and the LPMAC is the secret-prefix MAC with the message length prepended to the message before hashing. Wang et al. presented the first distinguishing attack on HMAC/NMAC-MD5 without the related-key setting in [27], then they extended this technique to give a distinguishing attack on the LPMAC based on 61-step SHA-1 in [24]. In this paper, we utilize the techniques in [24,27] combined with our pseudo-near-collision differential path on the full RIPEMD, 58-step reduced RIPEMD-256 and 48-step reduced RIPEMD-320 to distinguish the LPMAC based on the full RIPEMD, 58-step reduced RIPEMD-256 and 48-step reduced RIPEMD-320 from the LPMAC based on a random function respectively. Because RIPEMD and RIPEMD-{256,320} all contain two different and independent parallel lines of operations, the difficulty of our attack is to choose proper message differences and to find proper near-collision differential paths of the two parallel lines of operations. The complexity of distinguishing the LPMAC based on the full RIPEMD is about 266 MAC queries. For the LPMAC based on 58-step reduced RIPEMD-256 and 48-step reduced RIPEMD-320, the complexities are about 2163.5 MAC queries and 2208.5 MAC queries respectively.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - 6th International Conference, Inscrypt 2010, Revised Selected Papers
Pages199-217
Number of pages19
DOIs
StatePublished - 2011
Externally publishedYes
Event6th China International Conference on Information Security and Cryptology, Inscrypt 2010 - Shanghai, China
Duration: 20 Oct 201024 Oct 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6584 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th China International Conference on Information Security and Cryptology, Inscrypt 2010
Country/TerritoryChina
CityShanghai
Period20/10/1024/10/10

Keywords

  • Hash function
  • MAC
  • RIPEMD- family
  • distinguishing attack

Fingerprint

Dive into the research topics of 'Distinguishing attacks on LPMAC based on the full RIPEMD and reduced-step RIPEMD-{256,320}'. Together they form a unique fingerprint.

Cite this