You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Protocols which use integrity protection often additionally require that an attacker cannot, for instance, gain information about the key by learning whether some (message, tag) combination is valid. The MAC game should additionally allow the adversary to make arbitrary queries of the form "is tag T valid for message M?" in order to capture this requirement.
The text was updated successfully, but these errors were encountered:
Thanks for the reference. I don't really know how to pick the right definition, but I think good rule of thumb is probably to do something that matches up with Wikipedia.
I don't have time for that myself, but am happy to accept contributions.
Protocols which use integrity protection often additionally require that an attacker cannot, for instance, gain information about the key by learning whether some (message, tag) combination is valid. The MAC game should additionally allow the adversary to make arbitrary queries of the form "is tag T valid for message M?" in order to capture this requirement.
The text was updated successfully, but these errors were encountered: