4

In Another look at HMAC from Koblitz and Menezes, they state that HMAC came along because doing h(secret || message) was vulnerable to length extension attacks. But as far as I know, these kind of attacks only exist because of the Merkle-Damgard construction.

Now that we have SHA-3, that does not use such a construction, and that is not vulnerable to length extension attacks. Do we need to use the complicated HMAC-SHA3 or can we just use SHA3 as a MAC?

otus
  • 32,132
  • 5
  • 70
  • 165
David 天宇 Wong
  • 1,535
  • 11
  • 26

0 Answers0