Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm

The Message Authenticator Algorithm (MAA) is one of the first cryptographic functions for computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity and integrity of banking transactions. In 1990 and 1991, three formal, yet non-executable, specifications of the MAA (in VDM, Z, and LOTOS) were developed at NPL. Since then, five formal executable specifications of the MAA (in LOTOS, LNT, and term rewrite systems) have been designed at INRIA Grenoble. This article provides an overview of the MAA and compares its formal specifications with respect to common-sense criteria, such as conciseness, readability, and efficiency of code generation.

[1]  Francisco Durán,et al.  The Second Rewrite Engines Competition , 2009, WRLA.

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  Hubert Garavel,et al.  Compilation of LOTOS Abstract Data Types , 1989, FORTE.

[4]  Bart Preneel,et al.  On the Security of Two MAC Algorithms , 1996, EUROCRYPT.

[5]  Francisco Durán,et al.  The Third Rewrite Engines Competition , 2010, WRLA.

[6]  Hartmut Ehrig,et al.  Fundamentals of Algebraic Specification 1: Equations and Initial Semantics , 1985 .

[7]  Son T. Vuong,et al.  Introduction to Algebraic Specifications Based on the Language ACT ONE , 1992, Comput. Networks ISDN Syst..

[8]  Bart Preneel Cryptanalysis of Message Authentication Codes , 1997, ISW.

[9]  Bart Preneel,et al.  On the Security of Iterated Message Authentication Codes , 1999, IEEE Trans. Inf. Theory.

[10]  Donald W. Davies,et al.  A Message Authenticator Algorithm Suitable for A Mainframe Computer , 1985, CRYPTO.

[11]  Hubert Garavel,et al.  A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm , 2017, MARS@ETAPS.

[12]  Graeme I. Parkin,et al.  Specification of the MAA Standard in VDM , 1991, VDM Europe.

[13]  Bart Preneel,et al.  MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.

[14]  Frédéric Lang,et al.  From LOTOS to LNT , 2017, ModelEd, TestEd, TrustEd.

[15]  Bart Preneel,et al.  Security analysis of the message authenticator algorithm (MAA) , 1997, Eur. Trans. Telecommun..

[16]  Hubert Garavel,et al.  Revisiting sequential composition in process calculi , 2015, J. Log. Algebraic Methods Program..

[17]  Radu Mateescu,et al.  CADP 2011: a toolbox for the construction and analysis of distributed processes , 2012, International Journal on Software Tools for Technology Transfer.