Security analysis of the message authenticator algorithm (MAA)
- 12 September 1997
- journal article
- focus
- Published by Wiley in European Transactions on Telecommunications
- Vol. 8 (5) , 455-470
- https://doi.org/10.1002/ett.4460080504
Abstract
The security of the ISO banking standard Message Authenticator Algorithm (ISO 8731‐2), also known as MAA, is considered. The attacks presented herein, which exploit the internal structure of the algorithm, are the first computationally feasible attacks on MAA. First a MAC forgery attack is presented that requires 217 messages of 256 kbytes or 224 messages of 1 kbyte; the latter circumvents the special MAA mode for long messages defined in the standard. Next a key recovery attack on MAA is described which requires 232 chosen texts consisting of a single message block. The number of off‐line multiplications for this attack varies between 244 for one key in 1000 to about 251 for one key in 50. This should be compared to about 3 265multiplications for an exhaustive key search. Finally it is shown that MAA has 233 keys for which it is rather easy to create a large cluster of collisions. These keys can be detected and recovered with 227 chosen texts. From these attacks follows me identification of several classes of weak keys for MAA.Keywords
This publication has 16 references indexed in Scilit:
- LFSR-based Hashing and AuthenticationPublished by Springer Nature ,2001
- On the Relation Between A-Codes and Codes Correcting Independent ErrorsPublished by Springer Nature ,2001
- Chosen-text attack on CBC-MACElectronics Letters, 1997
- MMH: Software message authentication in the Gbit/second ratesPublished by Springer Nature ,1997
- On the Security of Two MAC AlgorithmsPublished by Springer Nature ,1996
- Bucket Hashing and its Application to Fast Message AuthenticationPublished by Springer Nature ,1995
- XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom FunctionsPublished by Springer Nature ,1995
- MDx-MAC and Building Fast MACs from Hash FunctionsPublished by Springer Nature ,1995
- The First Experimental Cryptanalysis of the Data Encryption StandardPublished by Springer Nature ,1994
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981