From 36b27e733c83e02ac54d7a6c1aa0a43938d1fc1f Mon Sep 17 00:00:00 2001
From: cyfraeviolae
+ This attack was shown by Dutch cryptographer Niels Ferguson + in Authentication weaknesses in GCM. + He notes that a (then-)competing mode, CWC, avoids this attack by + encrypting the GMAC polynomial with the block cipher before adding + \(s\). This breaks the linear relationship between the ciphertext + and the MAC. +
Review the nonce reuse attack to learn why recovering the authentication key is enough to forge MACs over @@ -336,15 +344,6 @@ and compute a forged MAC for arbitrary ciphertext under the same nonce as in the nonce reuse attack.
-- This attack was first shown by Dutch cryptographer Niels Ferguson - in his paper Authentication weaknesses in GCM. - He notes that a (then-)competing mode, CWC, avoids this attack by - encrypting the GMAC polynomial with the block cipher before adding - \(s\). This breaks the linear relationship between the ciphertext - and the MAC. -
Readers who wish to implement this attack themselves can try Cryptopals; specifically -- cgit v1.2.3