Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks

被引:0
|
作者
Li, Xiaoqian [1 ]
Wang, Peng [1 ]
Li, Bao [1 ]
Sun, Zhelei [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
关键词
Authenticated encryption; Cryptanalysis; CMBC-MAC; SCMA; CBC-X; MODE;
D O I
10.1007/978-3-319-12087-4_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of 1 - 2(-64).
引用
收藏
页码:395 / 406
页数:12
相关论文
共 50 条
  • [41] Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem
    Li, Fagen
    Qin, Zhiguang
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 266 - 269
  • [42] Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks
    Yang, CC
    Wang, RC
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (11) : 4370 - 4372
  • [43] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    Int. J. Secur. Netw., 2013, 4 (194-199):
  • [44] Authenticated Encryption Schemes on Java']Java Card
    Pal, Rajesh Kumar
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 238 - 245
  • [45] AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS
    HORSTER, P
    MICHELS, M
    PETERSEN, H
    ELECTRONICS LETTERS, 1994, 30 (15) : 1212 - 1213
  • [46] Cryptanalysis of adaptive arithmetic coding encryption schemes
    Lim, J
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 216 - 227
  • [47] Key Assignment Schemes with Authenticated Encryption, revisited
    Pijnenburg, Jeroen
    Poettering, Bertram
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 40 - 67
  • [48] Efficient authenticated encryption schemes with public verifiability
    Wang, GL
    Bao, F
    Ma, CS
    Chen, KF
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
  • [49] Automated Analysis and Synthesis of Authenticated Encryption Schemes
    Viet Tung Hoang
    Katz, Jonathan
    Malozemoff, Alex J.
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 84 - 95
  • [50] Security Analysis of Two Authenticated Encryption Schemes
    Zhang, Jianhong
    Geng, Qin
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163