Security Analysis of WAGE Against Division Property Based Cube Attack

被引:0
|
作者
Das, Bijoy [1 ]
Das, Abhijit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Kharagpur, W Bengal, India
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023 | 2023年 / 14341卷
关键词
Authenticated Encryption; WAGE; Lightweight cipher; Division Property; Cube Attack;
D O I
10.1007/978-981-99-7032-2_29
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, as more Internet of Things (IoT) devices are connected to the internet, lightweight cryptography has become more and more important. WAGE is a LFSR-based authenticated encryption algorithm and one of the candidates in the NIST standard Lightweight Cryptography competition. It offers 128-bit security. In the literature, the best cryptanalytic estimates available for WAGE pertain to a correlation power attack that recovers the secret key up to 12 out of 111 rounds. In this paper, we evaluate the security of this cipher following the (bit-based) division property based cube attack using mixed-integerlinear-programming (MILP) models. Specifically, we investigate the security of the nonlinear feedback based initialization phase. To the best of our knowledge, our attack is the first one that investigates the security of the nonlinear feedback-based initialization phase of WAGE cipher. Theoretically, the results of our attack enable us to recover the secret key up to the reduced 18-round of the initialization phase utilizing 2123 time complexity and 26.32 keystream bits.
引用
收藏
页码:492 / 506
页数:15
相关论文
共 50 条
  • [41] Dual Security Based Protocol Against Gray-Hole Attack in MANET
    Mankotia, Vivek
    Sunkaria, Ramesh Kumar
    Gurung, Shashi
    AD HOC & SENSOR WIRELESS NETWORKS, 2023, 56 (1-2) : 81 - 104
  • [42] Extensions of the Cube Attack Based on Low Degree Annihilators
    Zhang, Aileen
    Lim, Chu-Wee
    Khoo, Khoongming
    Wei, Lei
    Pieprzyk, Josef
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 87 - +
  • [43] Analysis on Internet Attack and Security
    Chen, Jing
    ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2387 - 2390
  • [44] Researches on network security situation analysis based on attack states
    Lv, Huiying
    Cao, Yuanda
    Shi, Cuixia
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 640 - 646
  • [45] Network security analysis model based on the increase in attack ability
    Zhang, Haixia
    Su, Purui
    Feng, Dengguo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (12): : 2012 - 2019
  • [46] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [47] Detection of Black Hole Attack Using Code Division Security Method
    Ahmad, Syed Jalal
    Reddy, V. S. K.
    Damodaram, A.
    Krishna, P. Radha
    EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 307 - 314
  • [48] Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
    Marco Cianfriglia
    Stefano Guarino
    Massimo Bernaschi
    Flavio Lombardi
    Marco Pedicini
    Journal of Cryptographic Engineering, 2019, 9 : 375 - 392
  • [49] Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
    Cianfriglia, Marco
    Guarino, Stefano
    Bernaschi, Massimo
    Lombardi, Flavio
    Pedicini, Marco
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (04) : 375 - 392
  • [50] Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
    Endo, Kosei
    Kunihiro, Noboru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 153 - 161