Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks

被引:0
|
作者
Li, Xiaoqian [1 ]
Wang, Peng [1 ]
Li, Bao [1 ]
Sun, Zhelei [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
Authenticated encryption; Cryptanalysis; CMBC-MAC; SCMA; CBC-X; MODE;
D O I
10.1007/978-3-319-12087-4_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of 1 - 2(-64).
引用
下载
收藏
页码:395 / 406
页数:12
相关论文
共 50 条
  • [21] The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
    Khovratovich, Dmitry
    Rechberger, Christian
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 174 - 184
  • [22] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme
    Tan H.
    Shen B.
    Miao X.
    Zhang W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220
  • [23] Authenticated encryption schemes with message linkage
    Hwang, SJ
    Chang, CC
    Yang, WP
    INFORMATION PROCESSING LETTERS, 1996, 58 (04) : 189 - 194
  • [24] Cryptanalysis of some multimedia encryption schemes
    Jakimoski, Goce
    Subbalakshmi, K. P.
    IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (03) : 330 - 338
  • [25] Cryptanalysis and improvement of practical convertible authenticated encryption schemes using self-certified public keys
    Shao, Zuhua
    INFORMATICA, 2006, 17 (04) : 577 - 586
  • [26] An Efficient Authenticated-Encryption with Associated-Data Block Cipher Mode for Wireless Sensor Networks
    Adekunle, A. A.
    Woodhead, S. R.
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 375 - 385
  • [27] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [28] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766
  • [29] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [30] Cryptanalysis of password authenticated key exchange based on RSA for imbalanced wireless networks
    Yoon, EJ
    Yoo, KY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (06) : 2627 - 2628