The authors present a new divide and conquer key recovery attack on the retail MAC based on DES, which is a widely used algorithm to compute a message authentication code (MAC). The attack requires 232.5 known text-MAC pairs and 3·256 off-line computations to find the 112 bit key.

Additional Metadata
Keywords Cryptography, Message authentication
Persistent URL dx.doi.org/10.1049/el:19961045
Journal Electronics Letters
Citation
Preneel, B. (B.), & Van Oorschot, P. (1996). Key recovery attack on ANSI X9.19 retail MAC. Electronics Letters, 32(17), 1568–1569. doi:10.1049/el:19961045