all InfoSec news
Quantum Attacks on Beyond-Birthday-Bound MACs
Jan. 9, 2023, 3:24 p.m. |
IACR News www.iacr.org
ePrint Report: Quantum Attacks on Beyond-Birthday-Bound MACs
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
In this paper, we investigate the security of several recent MAC constructions with provable security beyond the birthday bound (called BBB MACs) in the quantum setting. On the one hand, we give periodic functions corresponding to targeted MACs (including PMACX, PMAC with parity, HPxHP, and HPxNP), and we can recover secret states using Simon algorithm, leading to forgery attacks with complexity O(n). This …
algorithm attacks bbb beyond called eprint report fei forgery functions gao mac macs provable security quantum quantum attacks recover report secret security states
More from www.iacr.org / IACR News
Updatable Policy-Compliant Signatures
18 hours ago |
www.iacr.org
Guess and Determine Analysis Based on Set Split
18 hours ago |
www.iacr.org
Real-Valued Somewhat-Pseudorandom Unitaries
1 day, 22 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Senior Security Engineer
@ LRQA | Birmingham, GB, B37 7ES
Product Security Intern
@ Sinch | Chicago, Illinois, United States
Cyber Support Engineer
@ Darktrace | New York