Knowledge (XXG)

PMAC (cryptography)

Source 📝

1276: 25: 1304: 1256: 1086: 939: 859: 247: 276: 206:
Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee. "Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant", 2006.
1360: 1341: 42: 803: 636: 932: 108: 89: 240: 61: 1135: 844: 329: 281: 46: 631: 68: 925: 849: 1365: 1251: 1206: 1019: 618: 260: 256: 129: 140:
and creating an efficient message authentication code that is reducible in security to the underlying block cipher.
1130: 233: 75: 35: 1334: 1246: 875: 514: 1236: 1226: 1081: 854: 690: 389: 384: 57: 1231: 1221: 1024: 984: 977: 967: 962: 777: 597: 972: 885: 271: 1279: 1125: 1071: 900: 550: 504: 394: 352: 337: 319: 1327: 1241: 1165: 570: 474: 424: 399: 1004: 895: 772: 721: 479: 439: 419: 144: 1110: 1094: 1041: 829: 813: 762: 347: 207: 82: 1170: 1160: 1031: 706: 1311: 1105: 793: 747: 509: 808: 757: 752: 540: 156: 133: 1180: 1100: 1061: 1009: 994: 798: 526: 155:
PMAC is no longer patented and can be used royalty-free. It was originally patented by
212: 177: 1354: 1261: 1216: 1175: 1155: 1051: 1014: 989: 890: 767: 469: 1211: 1056: 1046: 1036: 999: 948: 137: 201: 1190: 880: 726: 655: 651: 560: 24: 1150: 1120: 1115: 1076: 1140: 555: 342: 1303: 1185: 1145: 834: 731: 716: 711: 701: 665: 585: 499: 379: 670: 626: 404: 1066: 839: 580: 575: 545: 535: 494: 489: 484: 464: 459: 434: 429: 414: 374: 565: 454: 409: 357: 314: 309: 303: 680: 675: 646: 641: 605: 921: 229: 449: 444: 297: 18: 1315: 1087:
Cryptographically secure pseudorandom number generator
217: 1199: 955: 868: 822: 786: 740: 689: 617: 594: 523: 367: 328: 290: 49:. Unsourced material may be challenged and removed. 159:, but he has since abandoned his patent filings. 1335: 933: 241: 8: 1342: 1328: 940: 926: 918: 248: 234: 226: 222: 218: 178:"PMAC – A Parallelizable MAC – Background" 109:Learn how and when to remove this message 143:PMAC is similar in functionality to the 1310:This cryptography-related article is a 168: 16:Message authentication code algorithm 7: 1300: 1298: 47:adding citations to reliable sources 1314:. You can help Knowledge (XXG) by 14: 1302: 1275: 1274: 23: 136:. PMAC is a method of taking a 34:needs additional citations for 1136:Information-theoretic security 845:NIST hash function competition 132:algorithm. It was created by 1: 1361:Message authentication codes 850:Password Hashing Competition 261:message authentication codes 257:Cryptographic hash functions 1252:Message authentication code 1207:Cryptographic hash function 1020:Cryptographic hash function 804:Merkle–Damgård construction 202:Phil Rogaway's page on PMAC 130:message authentication code 1382: 1297: 1131:Harvest now, decrypt later 1270: 1247:Post-quantum cryptography 917: 267: 225: 221: 1237:Quantum key distribution 1227:Authenticated encryption 1082:Random number generation 598:key derivation functions 58:"PMAC" cryptography 1232:Public-key cryptography 1222:Symmetric-key algorithm 1025:Key derivation function 985:Cryptographic primitive 978:Authentication protocol 968:Outline of cryptography 963:History of cryptography 876:Hash-based cryptography 778:Length extension attack 973:Cryptographic protocol 886:Message authentication 1126:End-to-end encryption 1072:Cryptojacking malware 1242:Quantum cryptography 1166:Trusted timestamping 43:improve this article 1005:Cryptographic nonce 773:Side-channel attack 213:Rust implementation 124:, which stands for 1366:Cryptography stubs 1111:Subliminal channel 1095:Pseudorandom noise 1042:Key (cryptography) 830:CAESAR Competition 814:HAIFA construction 763:Brute-force attack 176:Rogaway, Phillip. 126:parallelizable MAC 1323: 1322: 1292: 1291: 1288: 1287: 1171:Key-based routing 1161:Trapdoor function 1032:Digital signature 913: 912: 909: 908: 707:ChaCha20-Poly1305 524:Password hashing/ 119: 118: 111: 93: 1373: 1344: 1337: 1330: 1306: 1299: 1278: 1277: 1106:Insecure channel 942: 935: 928: 919: 794:Avalanche effect 748:Collision attack 291:Common functions 250: 243: 236: 227: 223: 219: 189: 188: 186: 184: 173: 114: 107: 103: 100: 94: 92: 51: 27: 19: 1381: 1380: 1376: 1375: 1374: 1372: 1371: 1370: 1351: 1350: 1349: 1348: 1295: 1293: 1284: 1266: 1195: 951: 946: 905: 864: 823:Standardization 818: 809:Sponge function 782: 758:Birthday attack 753:Preimage attack 736: 692: 685: 613: 596: 595:General purpose 590: 525: 519: 368:Other functions 363: 330:SHA-3 finalists 324: 286: 263: 254: 198: 193: 192: 182: 180: 175: 174: 170: 165: 157:Phillip Rogaway 153: 134:Phillip Rogaway 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 1379: 1377: 1369: 1368: 1363: 1353: 1352: 1347: 1346: 1339: 1332: 1324: 1321: 1320: 1307: 1290: 1289: 1286: 1285: 1283: 1282: 1271: 1268: 1267: 1265: 1264: 1259: 1257:Random numbers 1254: 1249: 1244: 1239: 1234: 1229: 1224: 1219: 1214: 1209: 1203: 1201: 1197: 1196: 1194: 1193: 1188: 1183: 1181:Garlic routing 1178: 1173: 1168: 1163: 1158: 1153: 1148: 1143: 1138: 1133: 1128: 1123: 1118: 1113: 1108: 1103: 1101:Secure channel 1098: 1092: 1091: 1090: 1079: 1074: 1069: 1064: 1062:Key stretching 1059: 1054: 1049: 1044: 1039: 1034: 1029: 1028: 1027: 1022: 1012: 1010:Cryptovirology 1007: 1002: 997: 995:Cryptocurrency 992: 987: 982: 981: 980: 970: 965: 959: 957: 953: 952: 947: 945: 944: 937: 930: 922: 915: 914: 911: 910: 907: 906: 904: 903: 898: 893: 888: 883: 878: 872: 870: 866: 865: 863: 862: 857: 852: 847: 842: 837: 832: 826: 824: 820: 819: 817: 816: 811: 806: 801: 799:Hash collision 796: 790: 788: 784: 783: 781: 780: 775: 770: 765: 760: 755: 750: 744: 742: 738: 737: 735: 734: 729: 724: 719: 714: 709: 704: 698: 696: 687: 686: 684: 683: 678: 673: 668: 663: 658: 649: 644: 639: 634: 629: 623: 621: 615: 614: 612: 611: 608: 602: 600: 592: 591: 589: 588: 583: 578: 573: 568: 563: 558: 553: 548: 543: 538: 532: 530: 527:key stretching 521: 520: 518: 517: 512: 507: 502: 497: 492: 487: 482: 477: 472: 467: 462: 457: 452: 447: 442: 437: 432: 427: 422: 417: 412: 407: 402: 397: 392: 387: 382: 377: 371: 369: 365: 364: 362: 361: 355: 350: 345: 340: 334: 332: 326: 325: 323: 322: 317: 312: 307: 301: 294: 292: 288: 287: 285: 284: 279: 274: 268: 265: 264: 255: 253: 252: 245: 238: 230: 216: 215: 210: 204: 197: 196:External links 194: 191: 190: 167: 166: 164: 161: 152: 149: 117: 116: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1378: 1367: 1364: 1362: 1359: 1358: 1356: 1345: 1340: 1338: 1333: 1331: 1326: 1325: 1319: 1317: 1313: 1308: 1305: 1301: 1296: 1281: 1273: 1272: 1269: 1263: 1262:Steganography 1260: 1258: 1255: 1253: 1250: 1248: 1245: 1243: 1240: 1238: 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1218: 1217:Stream cipher 1215: 1213: 1210: 1208: 1205: 1204: 1202: 1198: 1192: 1189: 1187: 1184: 1182: 1179: 1177: 1176:Onion routing 1174: 1172: 1169: 1167: 1164: 1162: 1159: 1157: 1156:Shared secret 1154: 1152: 1149: 1147: 1144: 1142: 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1122: 1119: 1117: 1114: 1112: 1109: 1107: 1104: 1102: 1099: 1096: 1093: 1088: 1085: 1084: 1083: 1080: 1078: 1075: 1073: 1070: 1068: 1065: 1063: 1060: 1058: 1055: 1053: 1052:Key generator 1050: 1048: 1045: 1043: 1040: 1038: 1035: 1033: 1030: 1026: 1023: 1021: 1018: 1017: 1016: 1015:Hash function 1013: 1011: 1008: 1006: 1003: 1001: 998: 996: 993: 991: 990:Cryptanalysis 988: 986: 983: 979: 976: 975: 974: 971: 969: 966: 964: 961: 960: 958: 954: 950: 943: 938: 936: 931: 929: 924: 923: 920: 916: 902: 899: 897: 894: 892: 891:Proof of work 889: 887: 884: 882: 879: 877: 874: 873: 871: 867: 861: 858: 856: 853: 851: 848: 846: 843: 841: 838: 836: 833: 831: 828: 827: 825: 821: 815: 812: 810: 807: 805: 802: 800: 797: 795: 792: 791: 789: 785: 779: 776: 774: 771: 769: 768:Rainbow table 766: 764: 761: 759: 756: 754: 751: 749: 746: 745: 743: 739: 733: 730: 728: 725: 723: 720: 718: 715: 713: 710: 708: 705: 703: 700: 699: 697: 694: 691:Authenticated 688: 682: 679: 677: 674: 672: 669: 667: 664: 662: 659: 657: 653: 650: 648: 645: 643: 640: 638: 635: 633: 630: 628: 625: 624: 622: 620: 619:MAC functions 616: 609: 607: 604: 603: 601: 599: 593: 587: 584: 582: 579: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 533: 531: 528: 522: 516: 513: 511: 508: 506: 503: 501: 498: 496: 493: 491: 488: 486: 483: 481: 478: 476: 473: 471: 468: 466: 463: 461: 458: 456: 453: 451: 448: 446: 443: 441: 438: 436: 433: 431: 428: 426: 423: 421: 418: 416: 413: 411: 408: 406: 403: 401: 398: 396: 393: 391: 388: 386: 383: 381: 378: 376: 373: 372: 370: 366: 359: 356: 354: 351: 349: 346: 344: 341: 339: 336: 335: 333: 331: 327: 321: 318: 316: 313: 311: 308: 306:(compromised) 305: 302: 300:(compromised) 299: 296: 295: 293: 289: 283: 282:Known attacks 280: 278: 275: 273: 270: 269: 266: 262: 258: 251: 246: 244: 239: 237: 232: 231: 228: 224: 220: 214: 211: 208: 205: 203: 200: 199: 195: 179: 172: 169: 162: 160: 158: 150: 148: 146: 141: 139: 135: 131: 127: 123: 113: 110: 102: 99:December 2019 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 1316:expanding it 1309: 1294: 1212:Block cipher 1057:Key schedule 1047:Key exchange 1037:Kleptography 1000:Cryptosystem 949:Cryptography 660: 181:. Retrieved 171: 154: 142: 138:block cipher 125: 121: 120: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 1200:Mathematics 1191:Mix network 881:Merkle tree 869:Utilization 855:NSA Suite B 147:algorithm. 1355:Categories 1151:Ciphertext 1121:Decryption 1116:Encryption 1077:Ransomware 693:encryption 470:RadioGatún 277:Comparison 163:References 69:newspapers 1141:Plaintext 610:KDF1/KDF2 529:functions 515:Whirlpool 1280:Category 1186:Kademlia 1146:Codetext 1089:(CSPRNG) 835:CRYPTREC 666:Poly1305 586:yescrypt 500:Streebog 380:CubeHash 360:(winner) 183:6 August 956:General 741:Attacks 671:SipHash 627:CBC-MAC 561:LM hash 541:Balloon 405:HAS-160 151:Patents 128:, is a 83:scholar 1067:Keygen 901:Pepper 840:NESSIE 787:Design 581:scrypt 576:PBKDF2 551:Catena 546:bcrypt 536:Argon2 495:Snefru 490:Shabal 485:SWIFFT 465:RIPEMD 460:N-hash 435:MASH-2 430:MASH-1 415:Kupyna 375:BLAKE3 358:Keccak 343:Grøstl 320:BLAKE2 85:  78:  71:  64:  56:  1097:(PRN) 695:modes 571:Makwa 566:Lyra2 556:crypt 505:Tiger 455:MDC-2 410:HAVAL 395:Fugue 353:Skein 338:BLAKE 315:SHA-3 310:SHA-2 304:SHA-1 90:JSTOR 76:books 1312:stub 896:Salt 860:CNSA 727:IAPM 681:VMAC 676:UMAC 661:PMAC 656:CMAC 652:OMAC 647:NMAC 642:HMAC 637:GMAC 606:HKDF 475:SIMD 425:Lane 400:GOST 385:ECOH 272:List 259:and 209:(ps) 185:2017 145:OMAC 122:PMAC 62:news 732:OCB 722:GCM 717:EAX 712:CWC 702:CCM 632:DAA 510:VSH 480:SM3 450:MD6 445:MD4 440:MD2 420:LSH 390:FSB 298:MD5 45:by 1357:: 348:JH 1343:e 1336:t 1329:v 1318:. 941:e 934:t 927:v 654:/ 249:e 242:t 235:v 187:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"PMAC" cryptography
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
message authentication code
Phillip Rogaway
block cipher
OMAC
Phillip Rogaway
"PMAC – A Parallelizable MAC – Background"
Phil Rogaway's page on PMAC

Rust implementation
v
t
e
Cryptographic hash functions
message authentication codes
List
Comparison
Known attacks
MD5
SHA-1

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.