Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks

被引:0
|
作者
Li, Xiaoqian [1 ]
Wang, Peng [1 ]
Li, Bao [1 ]
Sun, Zhelei [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
Authenticated encryption; Cryptanalysis; CMBC-MAC; SCMA; CBC-X; MODE;
D O I
10.1007/978-3-319-12087-4_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of 1 - 2(-64).
引用
下载
收藏
页码:395 / 406
页数:12
相关论文
共 50 条
  • [1] Comparison of Authenticated-Encryption Schemes in Wireless Sensor Networks
    Simplicio, Marcos A., Jr.
    de Oliveira, Bruno T.
    Barreto, Paulo S. L. M.
    Margi, Cintia B.
    Carvalho, Tereza C. M. B.
    Naslund, Mats
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 450 - 457
  • [2] Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
    Li, Wenting
    Li, Bin
    Zhao, Yiming
    Wang, Ping
    Wei, Fushan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [3] Analysis of Authenticated Encryption Scheme for Wireless Sensor Networks
    Siddiqui, Adeel Ahmed
    Pirzada, Syed Jahanzeb Hussain
    2013 INTERNATIONAL CONFERENCE ON AEROSPACE SCIENCE & ENGINEERING (ICASE), 2013, : 27 - 30
  • [4] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [5] A Survey on Encryption Schemes in Wireless Sensor Networks
    Hayouni, Haythem
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2014 7TH INTERNATIONAL CONFERENCE ON ADVANCED SOFTWARE ENGINEERING AND ITS APPLICATIONS (ASEA), 2014, : 39 - 43
  • [6] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5
  • [7] Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
    Rasslan, Mohamed
    Youssef, Amr
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05) : 1301 - 1302
  • [8] Rabbit-MAC: Lightweight Authenticated Encryption in Wireless Sensor Networks
    Tahir, Ruhma
    Javed, Muhammad Younas
    Cheema, Ahmad Raza
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 573 - 577
  • [9] An Analysis of Link Layer Encryption Schemes in Wireless Sensor Networks
    Zhang, Xueying
    Heys, Howard M.
    Li, Cheng
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [10] Energy efficiency of encryption schemes applied to wireless sensor networks
    Zhang, Xueying
    Heys, Howard M.
    Li, Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (07) : 789 - 808