Keying Hash Functions for Message Authentication

Keying Hash Functions for Message Authentication

1996 | Mihir Bellare and Ran Canetti and Hugo Krawczyk
The paper "Keying Hash Functions for Message Authentication" by Mihir Bellare, Ran Canetti, and Hugo Krawczyk presents new, simple, and practical constructions of message authentication schemes based on cryptographic hash functions. The authors introduce NMAC (Nested MAC) and HMAC (Hash-based MAC), which are proven to be secure as long as the underlying hash function has reasonable cryptographic strengths. The schemes retain almost all the security of the underlying hash function and perform essentially the same as the hash function itself. They use the hash function as a black box, allowing for easy implementation using widely available library code or hardware. The security of these schemes is formally analyzed, showing that an attack on the MAC function implies a significant weakness in the underlying hash function. The paper also discusses the practical advantages of using these schemes, including their efficiency and the ability to replace the underlying hash function if serious weaknesses are found. The authors compare their constructions to other proposals, highlighting their superior security analysis and performance.The paper "Keying Hash Functions for Message Authentication" by Mihir Bellare, Ran Canetti, and Hugo Krawczyk presents new, simple, and practical constructions of message authentication schemes based on cryptographic hash functions. The authors introduce NMAC (Nested MAC) and HMAC (Hash-based MAC), which are proven to be secure as long as the underlying hash function has reasonable cryptographic strengths. The schemes retain almost all the security of the underlying hash function and perform essentially the same as the hash function itself. They use the hash function as a black box, allowing for easy implementation using widely available library code or hardware. The security of these schemes is formally analyzed, showing that an attack on the MAC function implies a significant weakness in the underlying hash function. The paper also discusses the practical advantages of using these schemes, including their efficiency and the ability to replace the underlying hash function if serious weaknesses are found. The authors compare their constructions to other proposals, highlighting their superior security analysis and performance.
Reach us at info@study.space