1276:
25:
1304:
1256:
1086:
939:
859:
247:
276:
206:
Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee. "Forgery and Key
Recovery Attacks on PMAC and Mitchell's TMAC Variant", 2006.
1360:
1341:
42:
803:
636:
932:
108:
89:
240:
61:
1135:
844:
329:
281:
46:
631:
68:
925:
849:
1365:
1251:
1206:
1019:
618:
260:
256:
129:
140:
and creating an efficient message authentication code that is reducible in security to the underlying block cipher.
1130:
233:
75:
35:
1334:
1246:
875:
514:
1236:
1226:
1081:
854:
690:
389:
384:
57:
1231:
1221:
1024:
984:
977:
967:
962:
777:
597:
972:
885:
271:
1279:
1125:
1071:
900:
550:
504:
394:
352:
337:
319:
1327:
1241:
1165:
570:
474:
424:
399:
1004:
895:
772:
721:
479:
439:
419:
144:
1110:
1094:
1041:
829:
813:
762:
347:
207:
82:
1170:
1160:
1031:
706:
1311:
1105:
793:
747:
509:
808:
757:
752:
540:
156:
133:
1180:
1100:
1061:
1009:
994:
798:
526:
155:
PMAC is no longer patented and can be used royalty-free. It was originally patented by
212:
177:
1354:
1261:
1216:
1175:
1155:
1051:
1014:
989:
890:
767:
469:
1211:
1056:
1046:
1036:
999:
948:
137:
201:
1190:
880:
726:
655:
651:
560:
24:
1150:
1120:
1115:
1076:
1140:
555:
342:
1303:
1185:
1145:
834:
731:
716:
711:
701:
665:
585:
499:
379:
670:
626:
404:
1066:
839:
580:
575:
545:
535:
494:
489:
484:
464:
459:
434:
429:
414:
374:
565:
454:
409:
357:
314:
309:
303:
680:
675:
646:
641:
605:
921:
229:
449:
444:
297:
18:
1315:
1087:
Cryptographically secure pseudorandom number generator
217:
1199:
955:
868:
822:
786:
740:
689:
617:
594:
523:
367:
328:
290:
49:. Unsourced material may be challenged and removed.
159:, but he has since abandoned his patent filings.
1335:
933:
241:
8:
1342:
1328:
940:
926:
918:
248:
234:
226:
222:
218:
178:"PMAC – A Parallelizable MAC – Background"
109:Learn how and when to remove this message
143:PMAC is similar in functionality to the
1310:This cryptography-related article is a
168:
16:Message authentication code algorithm
7:
1300:
1298:
47:adding citations to reliable sources
1314:. You can help Knowledge (XXG) by
14:
1302:
1275:
1274:
23:
136:. PMAC is a method of taking a
34:needs additional citations for
1136:Information-theoretic security
845:NIST hash function competition
132:algorithm. It was created by
1:
1361:Message authentication codes
850:Password Hashing Competition
261:message authentication codes
257:Cryptographic hash functions
1252:Message authentication code
1207:Cryptographic hash function
1020:Cryptographic hash function
804:Merkle–Damgård construction
202:Phil Rogaway's page on PMAC
130:message authentication code
1382:
1297:
1131:Harvest now, decrypt later
1270:
1247:Post-quantum cryptography
917:
267:
225:
221:
1237:Quantum key distribution
1227:Authenticated encryption
1082:Random number generation
598:key derivation functions
58:"PMAC" cryptography
1232:Public-key cryptography
1222:Symmetric-key algorithm
1025:Key derivation function
985:Cryptographic primitive
978:Authentication protocol
968:Outline of cryptography
963:History of cryptography
876:Hash-based cryptography
778:Length extension attack
973:Cryptographic protocol
886:Message authentication
1126:End-to-end encryption
1072:Cryptojacking malware
1242:Quantum cryptography
1166:Trusted timestamping
43:improve this article
1005:Cryptographic nonce
773:Side-channel attack
213:Rust implementation
124:, which stands for
1366:Cryptography stubs
1111:Subliminal channel
1095:Pseudorandom noise
1042:Key (cryptography)
830:CAESAR Competition
814:HAIFA construction
763:Brute-force attack
176:Rogaway, Phillip.
126:parallelizable MAC
1323:
1322:
1292:
1291:
1288:
1287:
1171:Key-based routing
1161:Trapdoor function
1032:Digital signature
913:
912:
909:
908:
707:ChaCha20-Poly1305
524:Password hashing/
119:
118:
111:
93:
1373:
1344:
1337:
1330:
1306:
1299:
1278:
1277:
1106:Insecure channel
942:
935:
928:
919:
794:Avalanche effect
748:Collision attack
291:Common functions
250:
243:
236:
227:
223:
219:
189:
188:
186:
184:
173:
114:
107:
103:
100:
94:
92:
51:
27:
19:
1381:
1380:
1376:
1375:
1374:
1372:
1371:
1370:
1351:
1350:
1349:
1348:
1295:
1293:
1284:
1266:
1195:
951:
946:
905:
864:
823:Standardization
818:
809:Sponge function
782:
758:Birthday attack
753:Preimage attack
736:
692:
685:
613:
596:
595:General purpose
590:
525:
519:
368:Other functions
363:
330:SHA-3 finalists
324:
286:
263:
254:
198:
193:
192:
182:
180:
175:
174:
170:
165:
157:Phillip Rogaway
153:
134:Phillip Rogaway
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
1379:
1377:
1369:
1368:
1363:
1353:
1352:
1347:
1346:
1339:
1332:
1324:
1321:
1320:
1307:
1290:
1289:
1286:
1285:
1283:
1282:
1271:
1268:
1267:
1265:
1264:
1259:
1257:Random numbers
1254:
1249:
1244:
1239:
1234:
1229:
1224:
1219:
1214:
1209:
1203:
1201:
1197:
1196:
1194:
1193:
1188:
1183:
1181:Garlic routing
1178:
1173:
1168:
1163:
1158:
1153:
1148:
1143:
1138:
1133:
1128:
1123:
1118:
1113:
1108:
1103:
1101:Secure channel
1098:
1092:
1091:
1090:
1079:
1074:
1069:
1064:
1062:Key stretching
1059:
1054:
1049:
1044:
1039:
1034:
1029:
1028:
1027:
1022:
1012:
1010:Cryptovirology
1007:
1002:
997:
995:Cryptocurrency
992:
987:
982:
981:
980:
970:
965:
959:
957:
953:
952:
947:
945:
944:
937:
930:
922:
915:
914:
911:
910:
907:
906:
904:
903:
898:
893:
888:
883:
878:
872:
870:
866:
865:
863:
862:
857:
852:
847:
842:
837:
832:
826:
824:
820:
819:
817:
816:
811:
806:
801:
799:Hash collision
796:
790:
788:
784:
783:
781:
780:
775:
770:
765:
760:
755:
750:
744:
742:
738:
737:
735:
734:
729:
724:
719:
714:
709:
704:
698:
696:
687:
686:
684:
683:
678:
673:
668:
663:
658:
649:
644:
639:
634:
629:
623:
621:
615:
614:
612:
611:
608:
602:
600:
592:
591:
589:
588:
583:
578:
573:
568:
563:
558:
553:
548:
543:
538:
532:
530:
527:key stretching
521:
520:
518:
517:
512:
507:
502:
497:
492:
487:
482:
477:
472:
467:
462:
457:
452:
447:
442:
437:
432:
427:
422:
417:
412:
407:
402:
397:
392:
387:
382:
377:
371:
369:
365:
364:
362:
361:
355:
350:
345:
340:
334:
332:
326:
325:
323:
322:
317:
312:
307:
301:
294:
292:
288:
287:
285:
284:
279:
274:
268:
265:
264:
255:
253:
252:
245:
238:
230:
216:
215:
210:
204:
197:
196:External links
194:
191:
190:
167:
166:
164:
161:
152:
149:
117:
116:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
1378:
1367:
1364:
1362:
1359:
1358:
1356:
1345:
1340:
1338:
1333:
1331:
1326:
1325:
1319:
1317:
1313:
1308:
1305:
1301:
1296:
1281:
1273:
1272:
1269:
1263:
1262:Steganography
1260:
1258:
1255:
1253:
1250:
1248:
1245:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1223:
1220:
1218:
1217:Stream cipher
1215:
1213:
1210:
1208:
1205:
1204:
1202:
1198:
1192:
1189:
1187:
1184:
1182:
1179:
1177:
1176:Onion routing
1174:
1172:
1169:
1167:
1164:
1162:
1159:
1157:
1156:Shared secret
1154:
1152:
1149:
1147:
1144:
1142:
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1096:
1093:
1088:
1085:
1084:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1063:
1060:
1058:
1055:
1053:
1052:Key generator
1050:
1048:
1045:
1043:
1040:
1038:
1035:
1033:
1030:
1026:
1023:
1021:
1018:
1017:
1016:
1015:Hash function
1013:
1011:
1008:
1006:
1003:
1001:
998:
996:
993:
991:
990:Cryptanalysis
988:
986:
983:
979:
976:
975:
974:
971:
969:
966:
964:
961:
960:
958:
954:
950:
943:
938:
936:
931:
929:
924:
923:
920:
916:
902:
899:
897:
894:
892:
891:Proof of work
889:
887:
884:
882:
879:
877:
874:
873:
871:
867:
861:
858:
856:
853:
851:
848:
846:
843:
841:
838:
836:
833:
831:
828:
827:
825:
821:
815:
812:
810:
807:
805:
802:
800:
797:
795:
792:
791:
789:
785:
779:
776:
774:
771:
769:
768:Rainbow table
766:
764:
761:
759:
756:
754:
751:
749:
746:
745:
743:
739:
733:
730:
728:
725:
723:
720:
718:
715:
713:
710:
708:
705:
703:
700:
699:
697:
694:
691:Authenticated
688:
682:
679:
677:
674:
672:
669:
667:
664:
662:
659:
657:
653:
650:
648:
645:
643:
640:
638:
635:
633:
630:
628:
625:
624:
622:
620:
619:MAC functions
616:
609:
607:
604:
603:
601:
599:
593:
587:
584:
582:
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
533:
531:
528:
522:
516:
513:
511:
508:
506:
503:
501:
498:
496:
493:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
446:
443:
441:
438:
436:
433:
431:
428:
426:
423:
421:
418:
416:
413:
411:
408:
406:
403:
401:
398:
396:
393:
391:
388:
386:
383:
381:
378:
376:
373:
372:
370:
366:
359:
356:
354:
351:
349:
346:
344:
341:
339:
336:
335:
333:
331:
327:
321:
318:
316:
313:
311:
308:
306:(compromised)
305:
302:
300:(compromised)
299:
296:
295:
293:
289:
283:
282:Known attacks
280:
278:
275:
273:
270:
269:
266:
262:
258:
251:
246:
244:
239:
237:
232:
231:
228:
224:
220:
214:
211:
208:
205:
203:
200:
199:
195:
179:
172:
169:
162:
160:
158:
150:
148:
146:
141:
139:
135:
131:
127:
123:
113:
110:
102:
99:December 2019
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
1316:expanding it
1309:
1294:
1212:Block cipher
1057:Key schedule
1047:Key exchange
1037:Kleptography
1000:Cryptosystem
949:Cryptography
660:
181:. Retrieved
171:
154:
142:
138:block cipher
125:
121:
120:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
1200:Mathematics
1191:Mix network
881:Merkle tree
869:Utilization
855:NSA Suite B
147:algorithm.
1355:Categories
1151:Ciphertext
1121:Decryption
1116:Encryption
1077:Ransomware
693:encryption
470:RadioGatún
277:Comparison
163:References
69:newspapers
1141:Plaintext
610:KDF1/KDF2
529:functions
515:Whirlpool
1280:Category
1186:Kademlia
1146:Codetext
1089:(CSPRNG)
835:CRYPTREC
666:Poly1305
586:yescrypt
500:Streebog
380:CubeHash
360:(winner)
183:6 August
956:General
741:Attacks
671:SipHash
627:CBC-MAC
561:LM hash
541:Balloon
405:HAS-160
151:Patents
128:, is a
83:scholar
1067:Keygen
901:Pepper
840:NESSIE
787:Design
581:scrypt
576:PBKDF2
551:Catena
546:bcrypt
536:Argon2
495:Snefru
490:Shabal
485:SWIFFT
465:RIPEMD
460:N-hash
435:MASH-2
430:MASH-1
415:Kupyna
375:BLAKE3
358:Keccak
343:Grøstl
320:BLAKE2
85:
78:
71:
64:
56:
1097:(PRN)
695:modes
571:Makwa
566:Lyra2
556:crypt
505:Tiger
455:MDC-2
410:HAVAL
395:Fugue
353:Skein
338:BLAKE
315:SHA-3
310:SHA-2
304:SHA-1
90:JSTOR
76:books
1312:stub
896:Salt
860:CNSA
727:IAPM
681:VMAC
676:UMAC
661:PMAC
656:CMAC
652:OMAC
647:NMAC
642:HMAC
637:GMAC
606:HKDF
475:SIMD
425:Lane
400:GOST
385:ECOH
272:List
259:and
209:(ps)
185:2017
145:OMAC
122:PMAC
62:news
732:OCB
722:GCM
717:EAX
712:CWC
702:CCM
632:DAA
510:VSH
480:SM3
450:MD6
445:MD4
440:MD2
420:LSH
390:FSB
298:MD5
45:by
1357::
348:JH
1343:e
1336:t
1329:v
1318:.
941:e
934:t
927:v
654:/
249:e
242:t
235:v
187:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.