Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes

被引:3
|
作者
Wagner, Eric [1 ,2 ]
Bauer, Jan [1 ]
Henze, Martin [1 ,2 ]
机构
[1] Fraunhofer FKIE, Bonn, Germany
[2] Rhein Westfal TH Aachen, Aachen, Germany
关键词
ProMACs; Progressive Authentication; Cyber-Physical Systems; COMMUNICATION; LIGHTWEIGHT;
D O I
10.1145/3507657.3528539
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Message authentication guarantees the integrity of messages exchanged over untrusted channels. However, to achieve this goal, message authentication considerably expands packet sizes, which is especially problematic in constrained wireless environments. To address this issue, progressive message authentication provides initially reduced integrity protection that is often sufficient to process messages upon reception. This reduced security is then successively improved with subsequent messages to uphold the strong guarantees of traditional integrity protection. However, contrary to previous claims, we show in this paper that existing progressive message authentication schemes are highly susceptible to packet loss induced by poor channel conditions or jamming attacks. Thus, we consider it imperative to rethink how authentication tags depend on the successful reception of surrounding packets. To this end, we propose R2-D2, which uses randomized dependencies with parameterized security guarantees to increase the resilience of progressive authentication against packet loss. To deploy our approach to resource-constrained devices, we introduce SP-MAC, which implements R2-D2 using efficient XOR operations. Our evaluation shows that SP-MAC is resilient to sophisticated network-level attacks and operates as resources-conscious and fast as existing, yet insecure, progressive message authentication schemes.
引用
收藏
页码:207 / 221
页数:15
相关论文
共 6 条
  • [1] Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
    Fraunhofer Fkie, Rwth Aachen University, Wachtberg, Germany
    不详
    [J]. WiSec - Proc. ACM Conf. Secur, Priv. in Wirel. Mob. Networks, 2022, (207-221):
  • [2] On the security of iterated message authentication codes
    Preneel, B
    van Oorschot, PC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (01) : 188 - 199
  • [3] Revisiting a Primitive: Analysis of Approximate Message Authentication Codes
    Tabatabaei, S. Amir Hossein A. E.
    Zivic, Natasa
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 743 - 748
  • [4] Security of message authentication codes in the presence of key-dependent messages
    Madeline González Muñiz
    Rainer Steinwandt
    [J]. Designs, Codes and Cryptography, 2012, 64 : 161 - 169
  • [5] Security of message authentication codes in the presence of key-dependent messages
    Muniz, Madeline Gonzalez
    Steinwandt, Rainer
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 161 - 169
  • [6] Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
    Wu, Xiaofu
    Yang, Zhen
    Ling, Cong
    Xia, Xiang-Gen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1278 - 1290