Skip to main content

Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks

  • Conference paper
  • First Online:
  • 965 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8567))

Abstract

In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of \(1-2^{-64}\).

This work was supported by the National Basic Research Program of China (973 Project, No.2013CB338002), the National High Technology Research and Development Program of China (863 Program, No.2013AA014002), the National Natural Science Foundation Of China (No. 61272477, 61202422), the IIE’s Cryptography Research Project (No.Y3Z0027103, Y3Z0025103), and the Strategic Priority Research Program of Chinese Academy of Sciences under Grant XDA06010702.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Phillip, R.: Authenticated-encryption with associated-data. In: ACM Conference on Computer and Communications Security CCS 2002, pp. 98–107. ACM Press (2002)

    Google Scholar 

  2. Whiting, D., Housley, R., Ferguson, N.: IEEE 802.11-02/001r2: AES Encryption and Authentication Using CTR Mode and CBC-MAC (March 2002)

    Google Scholar 

  3. Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389–407. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Kohno, T., Viega, J., Whiting, D.: CWC: A high-performance conventional authenticated encryption mode. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 408–426. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. McGrew, D.A., Viega, J.: The galois/counter mode of operation (GCM) (2004). http://csrc.nist.gov/groups/ST/toolkit/BCM/

  6. Jutla, C.S.: Encryption modes with almost free message integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529–544. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: Reiter, M.K., Samarati, P. (eds.) ACM Conference on Computer and Communications Security, pp. 196–205. ACM (2001)

    Google Scholar 

  8. Karlof, C., Sastry, N., Wagner, D.: TinySec: A link security architecture for wireless sensor networks. In: SenSys ’04 (2004)

    Google Scholar 

  9. Lucks, S.: Two-pass authenticated encryption faster than generic composition. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 284–298. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Razvi Doomun, M., Sunjiv Soyjaudah, K.M.: Resource saving AES-CCMP design with hybrid counter mode block chaining - MAC. IJCSNS Int. J. Comput. Sci. Netw. Secur. 8(10), 1–13 (2008)

    Google Scholar 

  11. Adekunle, A.A., Woodhead, S.R.: An efficient authenticated-encryption with associated-data block cipher mode for wireless sensor networks. In: Osipov, E., Kassler, A., Bohnert, T.M., Masip-Bruin, X. (eds.) WWIC 2010. LNCS, vol. 6074, pp. 375–385. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Li, S., Li, T., Wang, X., Zhou, J., Chen, K.: Efficient link layer security scheme for wireless sensor networks. In: Proceedings of Journal on Information and Computational Science. Binary Information Press (2007)

    Google Scholar 

  13. Sung, J., Lee, S.-J., Lim, J.-I., Lee, W.I., Yi, O.: Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 103–113. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Adekunle, A., Woodhead, S.: On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, K. (ed.) NGMAST09, pp. 419–424. IEEE Computer Society, Los Alamitos (September 2009)

    Google Scholar 

  15. Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531–545. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  16. Skipjack and KEA Algorithm Specifications, Version 2.0, 29 May 1998. Available at the National Institute of Standards and Technology’s web page. http://csrc.nist.gov/encryption/skipjack-kea.htm

  17. Mitchell, C.J.: Cryptanalysis of two variants of PCBC mode when used for message integrity. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 560–571. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Acknowledgments

To the anonymous reviewer for useful comments and suggestions which improved the clarity and content of the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqian Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, X., Wang, P., Li, B., Sun, Z. (2014). Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. In: Lin, D., Xu, S., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2013. Lecture Notes in Computer Science(), vol 8567. Springer, Cham. https://doi.org/10.1007/978-3-319-12087-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12087-4_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12086-7

  • Online ISBN: 978-3-319-12087-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics