@inproceedings{a4561445cef543baaf45861124dd1d14,
title = "On the unprovable security of 2-Key XCBC",
abstract = "There has been extensive research focusing on improving CBC-MAC to operate on variable length messages with less keys and less blockcipher invocations. After Black and Rogaway's XCBC, Moriai and Imai proposed 2-Key XCBC, which replaced the third key of XCBC with its first key. Moriai and Imai {"}proved{"} that 2-Key XCBC is secure if the underling blockcipher is a pseudorandom permutation (PRP). Our research shows that it is not the case. The security of 2-Key XCBC can not be proved under the solo assumption of PRP, even if it is a RPR-RK secure against some related-key attack. We construct a special PRP (PRP-RK) to show that the main lemma in [14] is not true and 2-Key XCBC using this PRP (PRP-RK) is totally insecure.",
keywords = "Blockcipher, Blockcipher mode of operation, Message authentication code, Provable security, Related-key attack",
author = "Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang",
year = "2008",
doi = "10.1007/978-3-540-70500-0_17",
language = "English",
isbn = "3540699716",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "230--238",
booktitle = "Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings",
address = "Germany",
note = "13th Australasian Conference on Information Security and Privacy, ACISP 2008 ; Conference date: 07-07-2008 Through 09-07-2008",
}