# 11.3: Hash Functions vs. MACs: Length-Extension Attacks

$$\newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} }$$

$$\newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}}$$

$$\newcommand{\id}{\mathrm{id}}$$ $$\newcommand{\Span}{\mathrm{span}}$$

( \newcommand{\kernel}{\mathrm{null}\,}\) $$\newcommand{\range}{\mathrm{range}\,}$$

$$\newcommand{\RealPart}{\mathrm{Re}}$$ $$\newcommand{\ImaginaryPart}{\mathrm{Im}}$$

$$\newcommand{\Argument}{\mathrm{Arg}}$$ $$\newcommand{\norm}[1]{\| #1 \|}$$

$$\newcommand{\inner}[2]{\langle #1, #2 \rangle}$$

$$\newcommand{\Span}{\mathrm{span}}$$

$$\newcommand{\id}{\mathrm{id}}$$

$$\newcommand{\Span}{\mathrm{span}}$$

$$\newcommand{\kernel}{\mathrm{null}\,}$$

$$\newcommand{\range}{\mathrm{range}\,}$$

$$\newcommand{\RealPart}{\mathrm{Re}}$$

$$\newcommand{\ImaginaryPart}{\mathrm{Im}}$$

$$\newcommand{\Argument}{\mathrm{Arg}}$$

$$\newcommand{\norm}[1]{\| #1 \|}$$

$$\newcommand{\inner}[2]{\langle #1, #2 \rangle}$$

$$\newcommand{\Span}{\mathrm{span}}$$ $$\newcommand{\AA}{\unicode[.8,0]{x212B}}$$

$$\newcommand{\vectorA}[1]{\vec{#1}} % arrow$$

$$\newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow$$

$$\newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} }$$

$$\newcommand{\vectorC}[1]{\textbf{#1}}$$

$$\newcommand{\vectorD}[1]{\overrightarrow{#1}}$$

$$\newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}}$$

$$\newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}}$$

$$\newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} }$$

$$\newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}}$$

$$\newcommand{\avec}{\mathbf a}$$ $$\newcommand{\bvec}{\mathbf b}$$ $$\newcommand{\cvec}{\mathbf c}$$ $$\newcommand{\dvec}{\mathbf d}$$ $$\newcommand{\dtil}{\widetilde{\mathbf d}}$$ $$\newcommand{\evec}{\mathbf e}$$ $$\newcommand{\fvec}{\mathbf f}$$ $$\newcommand{\nvec}{\mathbf n}$$ $$\newcommand{\pvec}{\mathbf p}$$ $$\newcommand{\qvec}{\mathbf q}$$ $$\newcommand{\svec}{\mathbf s}$$ $$\newcommand{\tvec}{\mathbf t}$$ $$\newcommand{\uvec}{\mathbf u}$$ $$\newcommand{\vvec}{\mathbf v}$$ $$\newcommand{\wvec}{\mathbf w}$$ $$\newcommand{\xvec}{\mathbf x}$$ $$\newcommand{\yvec}{\mathbf y}$$ $$\newcommand{\zvec}{\mathbf z}$$ $$\newcommand{\rvec}{\mathbf r}$$ $$\newcommand{\mvec}{\mathbf m}$$ $$\newcommand{\zerovec}{\mathbf 0}$$ $$\newcommand{\onevec}{\mathbf 1}$$ $$\newcommand{\real}{\mathbb R}$$ $$\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}$$ $$\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}$$ $$\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}$$ $$\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}$$ $$\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}$$ $$\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}$$ $$\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}$$ $$\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}$$ $$\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}$$ $$\newcommand{\laspan}[1]{\text{Span}\{#1\}}$$ $$\newcommand{\bcal}{\cal B}$$ $$\newcommand{\ccal}{\cal C}$$ $$\newcommand{\scal}{\cal S}$$ $$\newcommand{\wcal}{\cal W}$$ $$\newcommand{\ecal}{\cal E}$$ $$\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}$$ $$\newcommand{\gray}[1]{\color{gray}{#1}}$$ $$\newcommand{\lgray}[1]{\color{lightgray}{#1}}$$ $$\newcommand{\rank}{\operatorname{rank}}$$ $$\newcommand{\row}{\text{Row}}$$ $$\newcommand{\col}{\text{Col}}$$ $$\renewcommand{\row}{\text{Row}}$$ $$\newcommand{\nul}{\text{Nul}}$$ $$\newcommand{\var}{\text{Var}}$$ $$\newcommand{\corr}{\text{corr}}$$ $$\newcommand{\len}[1]{\left|#1\right|}$$ $$\newcommand{\bbar}{\overline{\bvec}}$$ $$\newcommand{\bhat}{\widehat{\bvec}}$$ $$\newcommand{\bperp}{\bvec^\perp}$$ $$\newcommand{\xhat}{\widehat{\xvec}}$$ $$\newcommand{\vhat}{\widehat{\vvec}}$$ $$\newcommand{\uhat}{\widehat{\uvec}}$$ $$\newcommand{\what}{\widehat{\wvec}}$$ $$\newcommand{\Sighat}{\widehat{\Sigma}}$$ $$\newcommand{\lt}{<}$$ $$\newcommand{\gt}{>}$$ $$\newcommand{\amp}{&}$$ $$\definecolor{fillinmathshade}{gray}{0.9}$$

When we discuss hash functions, we generally consider the salt $$s$$ to be public. A natural question is, what happens when we make the salt private? Of all the cryptographic primitives we have discussed so far, a hash function with secret salt most closely resembles a MAC. So, do we get a secure MAC by using a hash function with private salt?

Unfortunately, the answer is no in general (although it can be yes in some cases, depending on the hash function). In particular, the method is insecure when $$H$$ is constructed using the Merkle-Damgård approach. The key observation is that:

knowing $$H(x)$$ allows you to predict the hash of any string that begins with $$\operatorname{MDPAD}(x)$$

This concept is best illustrated by example.

##### Example

Let’s return to our previous example, with a compression function $$h:\{0,1\}^{48} \rightarrow\{0,1\}^{32}$$. Suppose we construct a Merkle-Damgård hash out of this compression function, and use the construction $$\operatorname{MAC}(k, m)=H(k \| m)$$ as a $$M A C$$.

Suppose the MACkey is chosen as $$k=0110001111001101$$, and an attacker sees the MAC tag $$t$$ of the message $$m=010000111001011101010000$$. Then $$t=H(k \| m)$$ corresponds exactly to the example from before:

The only difference from before is that the first block contains the $$M A C k e y$$, so its value is not known to the attacker. We have shaded it in gray here. The attacker knows all other inputs as well as the output tag $$t$$.

I claim that the attacker can now exactly predict the tag of:

The correct MAC tag $$t^{\prime}$$ of this value would be computed by someone with the key as:

The attacker can compute the output $$t^{\prime}$$ in a different way, without knowing the key. In particular, the attacker knows all inputs to the last instance of $$h$$. Since the h function itself is public, the attacker can compute this value herself as $$t^{\prime}=h(t \| 0000000001000000)$$. Since she can predict the tag of $$m^{\prime}$$, having seen only the tag of $$m$$, she has broken the MAC scheme.

## Discussion

• In our example, the attacker sees the MAC tag for $$m$$ (computed as $$H(k \| m)$$ ) and then forges the tag for $$m^{\prime}=m \| p$$, where $$p$$ is the padding you must add when hashing $$k \| m$$. Note that the padding depends only on the length of $$k$$, which we assume is public.
• The same attack works to forge the tag of any $$m^{\prime}$$ that begins with $$m \| p$$. The attacker would simply have to compute the last several rounds (not just one round) of MerkleDamgård herself.
• This is not an attack on collision resistance! Length-extension does not result in collisions! We are not saying that $$k \| m$$ and $$k\|m\| p$$ have the same hash under $$H$$, only that knowing the hash of $$k \| m$$ allows you to also compute the hash of $$k\|m\| p$$.

Knowing how $$H(k \| m)$$ fails to be a MAC helps us understand better ways to build a secure MAC from a hash function:

• The Merkle-Damgård approach suffers from length-extension attacks because it outputs its entire internal state. In the example picture above, the value $$t$$ is both the output of $$H(k \| m)$$ as well as the only information about $$k \| m$$ needed to compute the last call to $$h$$ in the computation $$H(k\|m\| p)$$.

One way to avoid this problem is to only output part of the internal state. In MerkleDamgård, we compute $$y_{i}:=h\left(y_{i-1} \| x_{i}\right)$$ until reaching the final output $$y_{k+1}$$. Suppose instead that we only output half of $$y_{k+1}$$ (the $$y_{i}$$ values may need to be made longer in order for this to make sense). Then just knowing half of $$y_{k+1}$$ is not enough to predict what the hash output will be in a length-extension scenario.

The hash function SHA-3 was designed in this way (often called a "wide pipe" construction). One of the explicit design criteria of SHA-3 was that $$H(k \| m)$$ would be a secure MAC.

• Length extension with Merkle-Damgård is possible because the computation of $$H(k \| m)$$ exactly appears during the computation of $$H(k\|m\| p)$$. Similar problems appear in plain CBC-MAC when used with messages of mixed lengths. To avoid this, we can "do something different" to mark the end of the input. In a "wide pipe" construction, we throw away half of the internal state at the end. In ECBC-MAC, we use a different key for the last block of CBC chaining.

We can do something similar to the $$H(k \| m)$$ construction, by doing $$H\left(k_{2} \| H\left(k_{1} \| m\right)\right)$$, with independent keys. This change is enough to mark the end of the input. This construction is known as NMAC, and it can be proven secure for MerkleDamgård hash functions, under certain assumptions about their underlying compression function. A closely related (and popular) construction called HMAC allows $$k_{1}$$ and $$k_{2}$$ to even be related in some way.

This page titled 11.3: Hash Functions vs. MACs: Length-Extension Attacks is shared under a CC BY-NC-SA 4.0 license and was authored, remixed, and/or curated by Mike Rosulek (Open Oregon State) via source content that was edited to the style and standards of the LibreTexts platform.