2

I know that NMAC is mathematically proved with two different keys with length $L$.

But, if I choose to implement a MAC this way: $$H(k \operatorname\| H(k \operatorname\| msg))$$ with a key $k$ of length ​$2L$, ​am I vulnerable to some attacks?

Ilmari Karonen
  • 46,700
  • 5
  • 112
  • 189
Abmen
  • 21
  • 1

0 Answers0