[16011] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: HMAC?

daemon@ATHENA.MIT.EDU (John Kelsey)
Thu Aug 26 11:43:58 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 26 Aug 2004 11:09:14 -0400 (GMT-04:00)
From: John Kelsey <kelsey.j@ix.netcom.com>
Reply-To: John Kelsey <kelsey.j@ix.netcom.com>
To: Ben Laurie <ben@algroup.co.uk>,
	Amir Herzberg <herzbea@macs.biu.ac.il>
Cc: "Perry E. Metzger" <perry@piermont.com>,
	cryptography@metzdowd.com

>From: Ben Laurie <ben@algroup.co.uk>
>Sent: Aug 26, 2004 7:41 AM
>To: Amir Herzberg <herzbea@macs.biu.ac.il>
>Cc: "Perry E. Metzger" <perry@piermont.com>, cryptography@metzdowd.com
>Subject: Re: HMAC?

>Amir Herzberg wrote:

>> So, finding specific collisions in the hash function should not cause 
>> too much worry about its use in HMAC. Of course, if this would lead to 
>> finding many collisions easily, including to messages with random 
>> prefixes, this could be more worrying...

>Hmmm ... if you could persuade your victim to use a key that was known 
>to be a suitable prefix for finding collisions...

The big question is what the probability is of getting a successful
colliding message pair when you have complete control over the
message, but don't know the IV.  For repeated queries, you can know
it's always the *same* IV, if that helps, just not what it is.  I
don't think we can know that until we've seen the full explanation in
the Wang, et. al. paper, which hasn't been released yet.

--John Kelsey

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post