Security analysis of SDDO-based block cipher for wireless sensor network

被引:0
|
作者
Tran Song Dat Phuc
Changhoon Lee
机构
[1] Seoul National University of Science and Technology,Department of Computer Science and Engineering
来源
The Journal of Supercomputing | 2016年 / 72卷
关键词
Block cipher; BMD-128; Switchable data-dependent operations (SDDOs); Controlled substitution permutation network (CSPN); Cryptanalysis ; Related-key amplified boomerang attack;
D O I
暂无
中图分类号
学科分类号
摘要
Switchable data-dependent operations (SDDOs) that were introduced by Moldovyan (MMM-ACNS 2003, LNCS, vol 2776, pp 316–327. Springer, Heidelberg, 2003), have been proposed as a primitive suitable to designing efficient ciphers with simple key scheduling. These solve the problems of the weakness of key change process, and also the SDDO-based ciphers provide a high performance with smaller hardware requirement in implementation. Since Hawk-64, MD-64 (Bac et al. in Int J Comput Sci Netw Secur 10(3):54–60, 2010), KT-64 (Minh et al. in IJCSNS 19(1):10–18, 2010) are being used have block size of 64 bits, the BMD-128 (Bac et al. in Int J Comput Netw Inf Secur 11:1–10, 2012) has extended the size of block to 128 bits, show the improvement with high applicability, flexibility in fast and highly efficient telecommunication system, and high security against most known attack methods, such as slide attack, differential attack. In this paper, however, we indicate that the BMD-128 block cipher is still possible to be exploited with the related-key differential cryptanalysis. By constructing the related-key amplified boomerang differential characteristic with high probability on a 7-round reduced BMD-128, we can propose the related-key amplified boomerang attack on it with complexities of 279\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{79}$$\end{document} in data, 282\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{82}$$\end{document} bytes in memory, and 2129\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{129}$$\end{document} in computational time.
引用
收藏
页码:3619 / 3628
页数:9
相关论文
共 50 条
  • [21] Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
    Jinwala, Devesh
    Patel, Dhiren
    Dasgupta, Kankar
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2008, 5352 : 258 - +
  • [22] Network security analysis on diseases reporting at wireless sensor network
    Zhang, Yanling
    Ting, Zhang
    INTERNATIONAL JOURNAL OF NANOTECHNOLOGY, 2024, 21 (06) : 423 - 436
  • [23] Security of Intelligent Building Network Based on Wireless Sensor Network
    Xu, Shuang
    Zhou, Tong
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (06) : 151 - 164
  • [24] Security analysis of double length compression function based on block cipher
    Lin, Pin
    Wu, Wen-Ling
    Wu, Chuan-Kun
    International Journal of Network Security, 2007, 4 (02) : 121 - 127
  • [25] A novel compound chaotic block cipher for wireless sensor networks
    Tong, Xiao-Jun
    Wang, Zhu
    Liu, Yang
    Zhang, Miao
    Xu, Lianjie
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 22 (1-3) : 120 - 133
  • [26] Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks
    Kitae Jeong
    Changhoon Lee
    Jong In Lim
    EURASIP Journal on Wireless Communications and Networking, 2013
  • [27] Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks
    Jeong, Kitae
    Lee, Changhoon
    Lim, Jong In
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2013,
  • [28] Neural Network Based Analysis of Lightweight Block Cipher PRESENT
    Mishra, Girish
    Murthy, S. V. S. S. N. V. G. Krishna
    Pal, S. K.
    HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 969 - 978
  • [29] Wireless Sensor Network Security
    Liu, An
    Kim, Mihui
    Oliveira, Leonardo B.
    Tan, Hailun
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [30] Wireless Sensor Network and Security
    Sharma, Sonia
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3301 - 3304