Skip to content

Integrity and MAC games should require safety in the presence of a verification oracle #9

@cryslith

Description

@cryslith

Protocols which use integrity protection often additionally require that an attacker cannot, for instance, gain information about the key by learning whether some (message, tag) combination is valid. The MAC game should additionally allow the adversary to make arbitrary queries of the form "is tag T valid for message M?" in order to capture this requirement.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions