all InfoSec news
About “$k$-bit security” of MACs based on hash function Streebog
Sept. 2, 2023, 7:12 a.m. |
IACR News www.iacr.org
ePrint Report: About “$k$-bit security” of MACs based on hash function Streebog
Vitaly Kiryukhin
Various message authentication codes (MACs), including HMAC-Streebog and Streebog-K, are based on the keyless hash function Streebog. Under the assumption that the compression function of Streebog is resistant to the related key attacks, the security proofs of these algorithms were recently presented at CTCrypt 2022.
We carefully detail the resources of the adversary in the related key settings, revisit the proof, and obtain tight security bounds. …
attacks authentication compression eprint report function hash hash function hmac key keyless macs message report security under
More from www.iacr.org / IACR News
Blink: An Optimal Proof of Proof-of-Work
1 day, 20 hours ago |
www.iacr.org
PN-based Attacks in the White-box Setting
1 day, 20 hours ago |
www.iacr.org
Succinct Functional Commitments for Circuits from k-Lin
2 days, 2 hours ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
2 days, 2 hours ago |
www.iacr.org
Unstructured Inversions of New Hope
2 days, 2 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Technical Product Manager, Electronic Warfare - Active Clearance
@ Anduril | Costa Mesa, California, United States
Specialist Operations and Support/ Entry Professional - IT Security, Cyber Security & Governance
@ Norsk Hydro | Jaipur, IN
Embedded Software Engineer, Electronic Warfare
@ Anduril | Costa Mesa, California, United States
Cyber Security Analyst
@ Peraton | Chantilly, VA, United States
Principal Consultant, Proactive Security - Unit 42
@ Palo Alto Networks | Sydney, Australia
Penetration Tester Consultant
@ RSI Security | United States - Remote