Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks

被引:0
作者
Li, Xiaoqian [1 ]
Wang, Peng [1 ]
Li, Bao [1 ]
Sun, Zhelei [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013 | 2014年 / 8567卷
关键词
Authenticated encryption; Cryptanalysis; CMBC-MAC; SCMA; CBC-X; MODE;
D O I
10.1007/978-3-319-12087-4_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of 1 - 2(-64).
引用
收藏
页码:395 / 406
页数:12
相关论文
共 17 条
  • [1] Adekunle AA, 2010, LECT NOTES COMPUT SC, V6074, P375
  • [2] On Efficient Data Integrity and Data Origin Authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques
    Adekunle, A. A.
    Woodhead, S. R.
    [J]. THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2009, : 419 - 424
  • [3] [Anonymous], 1998, SKIPJ KEA ALG SPEC V
  • [4] [Anonymous], 2004, NIST MODES OPERATION
  • [5] [Anonymous], 2001, P 8 ACM C COMP COMM
  • [6] [Anonymous], SENSYS 04
  • [7] Bellare M, 2004, LECT NOTES COMPUT SC, V3017, P389
  • [8] Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
  • [9] Doomun MR, 2008, INT J COMPUT SCI NET, V8, P1
  • [10] Jaechul Sung, 2002, Information Security and Cryptology - ICISC 2001. 4th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2288), P103