MACs Flashcards
(10 cards)
How is a tag produced?
Hashing a message with a secret key
What does it mean if a MAC is secure against existential forgery?
If an attacker without the key can not produce a valid message-tag pair they haven’t seen before.
What is a length extension attack?
Where H(m1) can be fed into the state of a hash function. The hash function will continue from where it left off, then the attacker can feed in their own message, where the total message length is the same as m1, and it will produce a valid hash.
When is a MAC vulnerable to a length extension attack?
When the hash function used is
Is Encrypt-then-MAC secure?
Yes
Is MAC-then-Encrypt secure?
Not in general, but works in specific
instances (e.g., if encryption is CBC or CTR mode with
random IV).
Is Encrypt and MAC secure?
Not in general, but is in some instances
What is the authenticated encryption game?
Challenger picks random encryption key
Attacker does computations, may send messages
Challenger responds with ciphertexts
Attacker does more computations, submits different ciphertext c to challenger
Attacker has won if they forged a valid ciphertext c (where MAC is correct)
What conditions must a secure authenticated encryption scheme satisfy?
It satisfies IND-CPA
An attacker wins the authenticated encryption game with only negligible probability
What does it mean when an encryption scheme is IND-CPA secure?
It is indistinguishable under a chosen plaintext attack. If an attacker sends 2 plaintexts and the challenger returns 1 of them encrypted. The attacker has no better than a 50% chance of determining which plaintext was encrypted.