Security weaknesses of certain broadcast encryption schemes

被引:0
|
作者
Mihaljevic, Miodrag J.
Fossorier, Marc P. C.
Imai, Hideki
机构
[1] Serbian Acad Arts & Sci, Math Inst, Belgrade 11001, Serbia
[2] Univ Hawaii, Dept Elect Engn, Honolulu, HI 96822 USA
[3] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
关键词
broadcast encryption; key management; cryptanalysis; time-memory-data trade-off;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper points out to a generic vulnerability of certain broadcast encryption schemes. This vulnerability can be effectively explored assuming chosen plaintext attacks, and in some cases even under ciphertext only attack. The developed methods for cryptanalysis are based on an attacking approach not taken into account in the security evaluations of the reported broadcast encryption schemes. The proposed attacks are based on employment of a dedicated time-data-memory trade-off approach for cryptanalysis. Two algorithms for cryptanalysis are proposed (both in the basic and the generalized versions) and their main characteristics regarding the complexity and required sample are pointed out. The algorithms are applied for cryptanalysis of particular recently reported broadcast encryption schemes implying that their security is far below the claimed ones.
引用
收藏
页码:228 / 245
页数:18
相关论文
共 50 条
  • [41] Ciphertext verification security of symmetric encryption schemes
    HU ZhenYu1
    2 Institute of Software
    Science China(Information Sciences), 2009, (09) : 1617 - 1631
  • [42] A survey of certificateless encryption schemes and security models
    Alexander W. Dent
    International Journal of Information Security, 2008, 7 : 349 - 377
  • [43] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    Int. J. Secur. Netw., 2013, 4 (194-199):
  • [44] A survey of certificateless encryption schemes and security models
    Dent, Alexander W.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (05) : 349 - 377
  • [45] Ciphertext verification security of symmetric encryption schemes
    Hu ZhenYu
    Sun FuChun
    Jiang JianChun
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (09): : 1617 - 1631
  • [46] Ciphertext verification security of symmetric encryption schemes
    ZhenYu Hu
    FuChun Sun
    JianChun Jiang
    Science in China Series F: Information Sciences, 2009, 52 : 1617 - 1631
  • [47] Security Analysis of Two Authenticated Encryption Schemes
    Zhang, Jianhong
    Geng, Qin
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
  • [48] Weaknesses in Security Considerations Related to Chaos-Based Image Encryption
    Huetter, Thomas
    Preishuber, Mario
    Haemmerle-Uhl, Jutta
    Uhl, Andreas
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 278 - 291
  • [49] Machine Learning based Attack on Certain Encryption Schemes
    Saif, Anna
    Abidi, Musiur R.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [50] Sequential key derivation patterns for broadcast encryption and key predistribution schemes
    Attrapadung, N
    Kobara, K
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 374 - 391