SECURITY ANALYSIS OF THE MESSAGE AUTHENTICATOR ALGORITHM (MAA)

Citation
B. Preneel et al., SECURITY ANALYSIS OF THE MESSAGE AUTHENTICATOR ALGORITHM (MAA), European transactions on telecommunications, 8(5), 1997, pp. 455-470
Citations number
32
Categorie Soggetti
Telecommunications
ISSN journal
1124318X
Volume
8
Issue
5
Year of publication
1997
Pages
455 - 470
Database
ISI
SICI code
1120-3862(1997)8:5<455:SAOTMA>2.0.ZU;2-A
Abstract
The security of the ISO banking standard Message Authenticator Algorit hm (ISO 8731-2), also known as MAA, is considered. The attacks present ed herein, which exploit the internal structure of the algorithm, are the first computationally feasible attacks on MAA. First a MAC forgery attack is presented that requires 2(17) messages of 256 kbytes or 2(2 4) messages of 1 kbyte; the latter circumvents the special MAA mode fo r long messages defined in the standard. Next a key recovery attack on MAA is described which requires 2(32) chosen texts consisting of a si ngle message block. The number of off-line multiplications for this at tack varies between 2(44) for one key in 1000 to about 2(51) for one k ey in 50. This should be compared to about 3 . 2(65) multiplications f or an exhaustive key search. Finally it is shown that MAA has 2(33) ke ys for which it is rather easy to create a large cluster of collisions . These keys can be detected and recovered with 2(27) chosen texts. Fr om these attacks follows the identification of several classes of weak keys for MAA.