Security weaknesses of certain broadcast encryption schemes

被引:0
|
作者
Mihaljevic, Miodrag J.
Fossorier, Marc P. C.
Imai, Hideki
机构
[1] Serbian Acad Arts & Sci, Math Inst, Belgrade 11001, Serbia
[2] Univ Hawaii, Dept Elect Engn, Honolulu, HI 96822 USA
[3] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
关键词
broadcast encryption; key management; cryptanalysis; time-memory-data trade-off;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper points out to a generic vulnerability of certain broadcast encryption schemes. This vulnerability can be effectively explored assuming chosen plaintext attacks, and in some cases even under ciphertext only attack. The developed methods for cryptanalysis are based on an attacking approach not taken into account in the security evaluations of the reported broadcast encryption schemes. The proposed attacks are based on employment of a dedicated time-data-memory trade-off approach for cryptanalysis. Two algorithms for cryptanalysis are proposed (both in the basic and the generalized versions) and their main characteristics regarding the complexity and required sample are pointed out. The algorithms are applied for cryptanalysis of particular recently reported broadcast encryption schemes implying that their security is far below the claimed ones.
引用
收藏
页码:228 / 245
页数:18
相关论文
共 50 条
  • [21] Broadcast encryption schemes based on the sectioned key tree
    Mihaljevic, MJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 158 - 169
  • [22] Public key broadcast encryption schemes with shorter transmissions
    Park, Jong Hwan
    Kim, Hee Jean
    Sung, Maeng Hee
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON BROADCASTING, 2008, 54 (03) : 401 - 411
  • [23] Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
    Cheon, Jung Hee
    Jho, Nam-Su
    Kim, Myung-Hwan
    Yoo, Eun Sun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) : 5155 - 5171
  • [24] On the security of a class of image encryption schemes
    Li, Chengqing
    Chen, Guanrong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 3290 - +
  • [25] On the Semantic Security of Functional Encryption Schemes
    Barbosa, Manuel
    Farshim, Pooya
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 143 - 161
  • [26] On the Security of Verifiable Searchable Encryption Schemes
    Li, Chuang
    Xu, Chunxiang
    Li, Shanshan
    Chen, Kefei
    Miao, Yinbin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2977 - 2978
  • [27] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [28] On Some Weaknesses in the Disk Encryption Schemes EME and EME2
    Mancillas-Lopez, Cuauhtemoc
    Chakraborty, Debrup
    Rodriguez-Henriquez, Francisco
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 265 - 279
  • [29] Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
    Gentry, Craig
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 171 - +