Security weaknesses of certain broadcast encryption schemes

被引:0
作者
Mihaljevic, Miodrag J.
Fossorier, Marc P. C.
Imai, Hideki
机构
[1] Serbian Acad Arts & Sci, Math Inst, Belgrade 11001, Serbia
[2] Univ Hawaii, Dept Elect Engn, Honolulu, HI 96822 USA
[3] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
来源
DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS | 2006年 / 3919卷
关键词
broadcast encryption; key management; cryptanalysis; time-memory-data trade-off;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper points out to a generic vulnerability of certain broadcast encryption schemes. This vulnerability can be effectively explored assuming chosen plaintext attacks, and in some cases even under ciphertext only attack. The developed methods for cryptanalysis are based on an attacking approach not taken into account in the security evaluations of the reported broadcast encryption schemes. The proposed attacks are based on employment of a dedicated time-data-memory trade-off approach for cryptanalysis. Two algorithms for cryptanalysis are proposed (both in the basic and the generalized versions) and their main characteristics regarding the complexity and required sample are pointed out. The algorithms are applied for cryptanalysis of particular recently reported broadcast encryption schemes implying that their security is far below the claimed ones.
引用
收藏
页码:228 / 245
页数:18
相关论文
共 18 条
  • [1] Babbage S. H., 1995, IEE C PUBLICATION, V408, P161
  • [2] BERKOVITS S, 1991, LECT NOTES COMPUT SC, V547, P535
  • [3] Biryukov A, 2000, LECT NOTES COMPUT SC, V1976, P1
  • [4] Rigorous time/space trade-offs for inverting functions
    Fiat, A
    Naor, M
    [J]. SIAM JOURNAL ON COMPUTING, 2000, 29 (03) : 790 - 803
  • [5] Fiat A., 1994, LECT NOTES COMPUTER, V773, P480, DOI DOI 10.1007/3-540-48329-2
  • [6] GOLIC JD, 1997, LNCS, V1233, P239, DOI DOI 10.1007/3-540-69053-0
  • [7] Halevy D, 2002, LECT NOTES COMPUT SC, V2442, P47
  • [8] A CRYPTANALYTIC TIME-MEMORY TRADE-OFF
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1980, 26 (04) : 401 - 406
  • [9] Jho NS, 2005, LECT NOTES COMPUT SC, V3494, P559
  • [10] Anonymous trust: Digital rights management using broadcast encryption
    Lotspiech, J
    Nusser, S
    Pestoni, F
    [J]. PROCEEDINGS OF THE IEEE, 2004, 92 (06) : 898 - 909