Skip to main navigation Skip to search Skip to main content

Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

    Abstract

    Gemmell and Naor proposed a new protocol for the authentication of long messages which was based on block codes and which used a transmission channel k times. This multiround authentication makes it possible to limit the key size independently of the message length. We propose a new attack and show that the probability analysis made by Gemmell and Naor, which was only based on the minimum distance property of the codes, does not hold for our attack. Considering also the impersonation attack we conclude that the number of rounds have to be odd.
    Original languageEnglish
    Title of host publicationCRYPTO '94
    EditorsYvo Desmedt
    Place of PublicationBerlin, Heidelberg
    PublisherSpringer
    Pages121-128
    Number of pages7
    Volume839
    EditionIACR
    ISBN (Electronic)978-3-540-48658-9
    ISBN (Print)978-3-540-58333-2
    DOIs
    Publication statusPublished - 1994 Aug 21
    Event14th annual cryptographic conference CRYPTO '94 - California, Santa Barbara, United States
    Duration: 1994 Aug 211994 Aug 25
    Conference number: 14

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume839

    Conference

    Conference14th annual cryptographic conference CRYPTO '94
    Abbreviated titleCRYPTO '94
    Country/TerritoryUnited States
    CitySanta Barbara
    Period1994/08/211994/08/25

    Subject classification (UKÄ)

    • Other Electrical Engineering, Electronic Engineering, Information Engineering

    Free keywords

    • Hash functions
    • Block code
    • Impersonation attack
    • Message length

    Fingerprint

    Dive into the research topics of 'Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol'. Together they form a unique fingerprint.

    Cite this