On the security margin of MAC striping

Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt

Abstract

MAC striping intermixes a payload with its authentication tag, placing the bits used for message authentication in positions derived from a secret key. The use of MAC striping has been suggested to authenticate encrypted payloads using short tags. For an idealized MAC scheme, the probability of a selective forgery has been estimated as , when utilizing MAC striping with ℓ-bit payloads and m-bit tags. We show that this estimate is too optimistic. For and any payload, we achieve a selective forgery with probability , and usually many orders of magnitude more than that.
Original languageEnglish
JournalInformation Processing Letters
Volume115
Issue number11
Pages (from-to)899-902
Number of pages4
ISSN0020-0190
DOIs
Publication statusPublished - 11.2015

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure
  2. SDG 11 - Sustainable Cities and Communities
    SDG 11 Sustainable Cities and Communities
  3. SDG 12 - Responsible Consumption and Production
    SDG 12 Responsible Consumption and Production

Fingerprint

Dive into the research topics of 'On the security margin of MAC striping'. Together they form a unique fingerprint.

Cite this