0

Ok we know when we add a random IV in our "modified encrypted" MAC became useless and the IV can be forgery, then our encryption scheme becomes vulnerable to chosen plaintext attacks.

According those proves :

Finding IV for forgery of AES CBC-MAC with non-fixed IV

CBC-MAC insecure with random IV

But the addition at the last step of a new IV2, make any change?. Supposed NO, but how can prove it.

EMAC with IV-IV2

*The length of the IVs or Plaintexts at the scheme, does not state the length, the IVs or Plaintexts Can be Variables Or Fixed.

*We agree that all the IVs are public.

  • Can you rate the security of the following MAC, where the IV and IV2 values are Random with fixed length with fixed message length?.

  • Can you rate the security of the following MAC, where the IV and IV2 values are Random with variable length with variable message length?.

  • Can you rate the security of the following MAC, where the IV and IV2 values are Random with fixed length with variable message length?.

  • Can you rate the security of the following MAC, where the IV and IV2 values are Random with variable length with fixed message length?.

Under what conditions can this structure be considered safe with random length IVs?.

Poseid0n
  • 3
  • 2
  • 1
    Hi, those schemes are not encryption and rather MAC. The goal is to prevent from forging a new tag. In fact, the IV of the first construction should be fixed. With this context can you see issues with both constructions? – Marc Ilunga Dec 07 '23 at 08:16
  • Re-updated for version 12 of the question: Please fix the Q! 0) What's that notion of IV with variable, even random length?! The drawing implies IVs are as wide as the block cipher's message block, therefore IVs are fixed width/length. Accordingly remove any of the new sub-questions with variable width/length IV. 1) Tell if IVs are fixed and public; or vary in value with each MAC (as in the links); or if that's left to discuss. 2) The first sentence is hard to get; e.g. the drawing is not for an "encryption scheme". – fgrieu Dec 07 '23 at 08:57
  • Hints: If the assignment does not tell if IVs are fixed or not, then my guess is that you are supposed to discuss that first! Then I recommend discussing the attack if the block with Key 2 is removed and plaintext size is variable; and explain how Key 2 fixes that; then discuss what theoretical attack remains e.g. with DES the block cipher. Finally, can you prove that any attack that works against the scheme without IV2 can be adapted to the scheme with IV2 ? – fgrieu Dec 10 '23 at 20:57
  • The Keys is random so they are not fixed...
  • – Poseid0n Dec 11 '23 at 08:41
  • If we suppose that the 2nd Key is removed.... then a forgery attack in the MAC will be easy with random IV not 0. After the addition of the 2nd Key the scheme could be secure if the IV is 0 but not with random IV(the links above's is the supposed forge attack at the IV) the attack will be the same as the above links.....But the addition of the IV2 could improve anything, can we manipulate that IV(2) if it is at the last block?. You will tell me if we can manipulate the first IV then the scheme is broken, but if we cant manipulate the IV(2) then we can save things. Am i right?.
  • – Poseid0n Dec 11 '23 at 08:51
  • Sorry with the Key2 we can try also the birthday attack – Poseid0n Dec 11 '23 at 09:09
  • That who keep me back is, if we can't forge the IV2 the recipient will not be able to authenticate the message even if we succussed forge the 1st IV. This is not an improvement?. Under what circumstances that will be secure with random IVs?. – Poseid0n Dec 11 '23 at 09:21
  • I have put it in quotation marks, I have baptized it "encrypted" because have some elements of encryption and MAC and CBC etc. – Poseid0n Dec 11 '23 at 10:22