کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
428514 686790 2014 4 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Practical attack on NLM-MAC scheme
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Practical attack on NLM-MAC scheme
چکیده انگلیسی


• A key recovery attack breaks NLM-n   generator with time complexity about nlog7×2.
• By having only one pair (MAC tag, ciphertext), a forgery attack on the MAC function has been applied in real time.
• The proposed attacks are completely practical.

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols.The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information Processing Letters - Volume 114, Issue 10, October 2014, Pages 547–550
نویسندگان
, , ,