2021. Security Analysis of SFrame Result 2: Security of AES-CM-HMAC with Short Tags 21 Target member An impersonation attack by a malicious group member n exploits a vulnerability of very short tag length n caused by the digital signature Sig computed only a list of AEAD tags 𝑁, aad, 𝑪!, 𝑻!, Sig 𝑁, aad, 𝑪∗, 𝑻′, Sig 𝐶 𝑇 ⋮ ⋮ 𝐶∗ 𝑇∗ ⋮ ⋮ = 𝑻′ Security Analysis Other members Malicious member Online phase 1. intercepts a target frame 𝑁, aad, 𝐶,, 𝑇,, Sig sent by the target member 2. searches a tuple 𝑀∗, 𝐶∗, 𝑇∗ in the table such that 𝑇∗ = 𝑇, and 𝐶∗ ≠ 𝐶, 3. finds such a tuple, replaces 𝐶, with 𝐶∗ in the target frame, and sends 𝑁, 𝑎𝑎𝑑, 𝐶∗, 𝑇′, Sig to other group members When the tag length is 4 bytes, if the adversary prepares 232 tuples in the table, the success probability is almost one.