Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks

被引:0
|
作者
Li, Xiaoqian [1 ]
Wang, Peng [1 ]
Li, Bao [1 ]
Sun, Zhelei [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
Authenticated encryption; Cryptanalysis; CMBC-MAC; SCMA; CBC-X; MODE;
D O I
10.1007/978-3-319-12087-4_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of 1 - 2(-64).
引用
收藏
页码:395 / 406
页数:12
相关论文
共 50 条
  • [31] Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [32] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08):
  • [33] Authenticated in-network programming for wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2006, 4104 : 390 - 403
  • [34] An Authenticated Key Agreement Scheme for Wireless Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2014, 3 (03): : 181 - 206
  • [35] Authenticated key agreement protocol for wireless sensor networks
    Li, Zhang
    Bin, Xie
    Qiang, He Z.
    Quan, Jin Y.
    Open Cybernetics and Systemics Journal, 2014, 8 (01): : 98 - 103
  • [36] Secure and Authenticated Data Communication in Wireless Sensor Networks
    Alfandi, Omar
    Bochem, Arne
    Kellner, Ansgar
    Goege, Christian
    Hogrefe, Dieter
    SENSORS, 2015, 15 (08) : 19560 - 19582
  • [37] Cryptanalysis and improvement of an authentication protocol for wireless sensor networks
    Neerul
    Kumar, Devender
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (05)
  • [38] Encryption Model for Sensor Data in Wireless Sensor Networks
    Vangala, Anusha
    Parwekar, Pritee
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 : 963 - 970
  • [39] Authentication Schemes for Wireless Sensor Networks
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Elhajj, Imad
    2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 367 - 372
  • [40] Cryptanalysis on generalization of threshold signature and authenticated encryption for group communications
    Zhang, Honglie
    Zhang, Guoyin
    Li, Jiguo
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 665 - +