Note on Distinguishing , Forgery , and Second Preimage Attacks on HMAC-SHA-1 and a Method to Reduce the Key Entropy of NMAC

The first distinguishing, forgery and second preimage attacks on step-reduced HMAC-SHA-1 have recently been presented by Kim et al. In this note we report on ongoing work to improve their data complexity and present new attacks on HMAC-SHA-1 covering more steps. Additionally, we show how a collision-based technique can be used to reduce the key entropy of NMAC-SHA-1. Finally we comment on the applicability of the used techniques for analyzing a recent randomized hashing proposal. We expect the improvements as well as the new key entropy reduction technique to be applicable to HMAC and NMAC instantiated with other hash functions of the MD4 family as well.