{"id":"https://openalex.org/W2092696491","doi":"https://doi.org/10.1002/ett.4460080504","title":"Security analysis of the message authenticator algorithm (MAA)","display_name":"Security analysis of the message authenticator algorithm (MAA)","publication_year":1997,"publication_date":"1997-09-01","ids":{"openalex":"https://openalex.org/W2092696491","doi":"https://doi.org/10.1002/ett.4460080504","mag":"2092696491"},"language":"en","primary_location":{"id":"doi:10.1002/ett.4460080504","is_oa":false,"landing_page_url":"https://doi.org/10.1002/ett.4460080504","pdf_url":null,"source":{"id":"https://openalex.org/S4393917101","display_name":"European Transactions on Telecommunications","issn_l":"1124-318X","issn":["1124-318X","1541-8251"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"European Transactions on Telecommunications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039506639","display_name":"Bart Preneel","orcid":"https://orcid.org/0000-0003-2005-9651"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Bart Preneel","raw_affiliation_strings":["Katholieke Universiteit Leuven, Dept. Electrical Engineering-ESAT Kardinaal Mercierlaan 94, B-3001 Heverlee - Belgium bart.preneel, vincent rijmen@esat.kuleuven.ac.be"],"affiliations":[{"raw_affiliation_string":"Katholieke Universiteit Leuven, Dept. Electrical Engineering-ESAT Kardinaal Mercierlaan 94, B-3001 Heverlee - Belgium bart.preneel, vincent rijmen@esat.kuleuven.ac.be","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111867391","display_name":"Vincent Rumen","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Vincent Rumen","raw_affiliation_strings":["Katholieke Universiteit Leuven, Dept. Electrical Engineering-ESAT Kardinaal Mercierlaan 94, B-3001 Heverlee - Belgium bart.preneel, vincent rijmen@esat.kuleuven.ac.be"],"affiliations":[{"raw_affiliation_string":"Katholieke Universiteit Leuven, Dept. Electrical Engineering-ESAT Kardinaal Mercierlaan 94, B-3001 Heverlee - Belgium bart.preneel, vincent rijmen@esat.kuleuven.ac.be","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I4210090320","display_name":"Entrust (Canada)","ror":"https://ror.org/00emrap86","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210090320"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Paul C. Van Oorschot","raw_affiliation_strings":["Entrust Technologies, 750 Heron Road, Ottawa, Ontario K1Y 4H7 - Canada paulv@entrust.com","Entrust Technologies, 750 Heron Road, Ottawa, Ontario K1Y 4H7 \u2010 Canada paulv@entrust.com"],"affiliations":[{"raw_affiliation_string":"Entrust Technologies, 750 Heron Road, Ottawa, Ontario K1Y 4H7 - Canada paulv@entrust.com","institution_ids":["https://openalex.org/I4210090320"]},{"raw_affiliation_string":"Entrust Technologies, 750 Heron Road, Ottawa, Ontario K1Y 4H7 \u2010 Canada paulv@entrust.com","institution_ids":["https://openalex.org/I4210090320"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039506639"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":2.9251,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.91601076,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"8","issue":"5","first_page":"455","last_page":"470"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.758340060710907},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.604893147945404},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5057957172393799},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4657764136791229},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4362432360649109},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4207174479961395},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3259088695049286},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32317525148391724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2656298279762268},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17654013633728027},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.09114700555801392}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.758340060710907},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.604893147945404},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5057957172393799},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4657764136791229},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4362432360649109},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4207174479961395},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3259088695049286},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32317525148391724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2656298279762268},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17654013633728027},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.09114700555801392},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/ett.4460080504","is_oa":false,"landing_page_url":"https://doi.org/10.1002/ett.4460080504","pdf_url":null,"source":{"id":"https://openalex.org/S4393917101","display_name":"European Transactions on Telecommunications","issn_l":"1124-318X","issn":["1124-318X","1541-8251"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"European Transactions on Telecommunications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W39590651","https://openalex.org/W1489155257","https://openalex.org/W1511186238","https://openalex.org/W1537206908","https://openalex.org/W1537258615","https://openalex.org/W1567501709","https://openalex.org/W1589410660","https://openalex.org/W1622101750","https://openalex.org/W1744198125","https://openalex.org/W1978033790","https://openalex.org/W1978695162","https://openalex.org/W1979802565","https://openalex.org/W1985623009","https://openalex.org/W2081897065","https://openalex.org/W2107165730","https://openalex.org/W2112006428","https://openalex.org/W2122984309","https://openalex.org/W2127124188","https://openalex.org/W2131300413","https://openalex.org/W2167569963","https://openalex.org/W3204802657","https://openalex.org/W4301441647"],"related_works":["https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703","https://openalex.org/W41015297","https://openalex.org/W2982428536"],"abstract_inverted_index":{"Abstract":[0],"The":[1,19,96],"security":[2],"of":[3,28,51,58,91,98,158,178,181],"the":[4,25,29,32,61,64,73],"ISO":[5],"banking":[6],"standard":[7],"Message":[8],"Authenticator":[9],"Algorithm":[10],"(ISO":[11],"8731\u20102),":[12],"also":[13],"known":[14],"as":[15],"MAA,":[16],"is":[17,44,82,139,150],"considered.":[18],"attacks":[20,36,174],"presented":[21,45],"herein,":[22],"which":[23,84,148],"exploit":[24],"internal":[26],"structure":[27],"algorithm,":[30],"are":[31],"first":[33],"computationally":[34],"feasible":[35],"on":[37,80],"MAA.":[38,185],"First":[39],"a":[40,76,92,155],"MAC":[41],"forgery":[42],"attack":[43,79,103],"that":[46,141],"requires":[47,85],"2":[48,55,86,106,115,129,144,168],"17":[49],"messages":[50,57,70],"256":[52],"kbytes":[53],"or":[54],"24":[56],"1":[59],"kbyte;":[60],"latter":[62],"circumvents":[63],"special":[65],"MAA":[66,81,142],"mode":[67],"for":[68,101,108,117,132,147,184],"long":[69],"defined":[71],"in":[72,111,120],"standard.":[74],"Next":[75],"key":[77,110,119,135],"recovery":[78],"described":[83],"32":[87],"chosen":[88,170],"texts":[89],"consisting":[90],"single":[93],"message":[94],"block.":[95],"number":[97],"off\u2010line":[99],"multiplications":[100,131],"this":[102],"varies":[104],"between":[105],"44":[107],"one":[109,118],"1000":[112],"to":[113,126,153],"about":[114,127],"51":[116],"50.":[121],"This":[122],"should":[123],"be":[124,163],"compared":[125],"3":[128],"65":[130],"an":[133],"exhaustive":[134],"search.":[136],"Finally":[137],"it":[138,149],"shown":[140],"has":[143],"33":[145],"keys":[146,161,183],"rather":[151],"easy":[152],"create":[154],"large":[156],"cluster":[157],"collisions.":[159],"These":[160],"can":[162],"detected":[164],"and":[165],"recovered":[166],"with":[167],"27":[169],"texts.":[171],"From":[172],"these":[173],"follows":[175],"me":[176],"identification":[177],"several":[179],"classes":[180],"weak":[182]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
