Cryptanalysis On Hmac/Nmac-Md5 And Md5-Mac

Xiaoyun Wang,Hongbo Yu,Wei Wang,Haina Zhang,Tao Zhan
DOI: https://doi.org/10.1007/978-3-642-01001-9_7
2009-01-01
Abstract:In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 2(97) queries, with a success probability 0.87, while the previous distinguishing attack on HMAC-MD5 reduced to 33 rounds takes 2(126.1) messages with a success rate of 0.92. Furthermore, we give distinguishing and partial key recovery attacks on MDx-MAC based on MD5. The MDx-MAC was proposed by Preneel and van Oorschot in Crypto'95 which uses three subkeys derived from the initial key. We are able to recover one 128-bit subkey with 2(97) queries.
What problem does this paper attempt to address?