网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (1): 60-65.doi: 10.11959/j.issn.2096-109x.2016.00012

• 学术论文 • 上一篇    下一篇

认证加密算法SCREAM及iSCREAM的新伪造攻击

田玉丹1,韦永壮2,3   

  1. 1 桂林电子科技大学广西信息科学实验中心,广西 桂林 541004
    2 桂林电子科技大学认知无线电与信息处理省部共建教育部重点实验,广西 桂林 541004
    3 中国科学院信息工程研究所信息安全国家重点实验室,北京 100039
  • 修回日期:2015-11-20 出版日期:2016-01-01 发布日期:2016-02-16
  • 作者简介:王姣(1990-),女,河北石家庄人,桂林电子科技大学硕士生,主要研究方向为工业大数据的安全测评。|王姣(1990-),女,河北石家庄人,桂林电子科技大学硕士生,主要研究方向为工业大数据的安全测评。
  • 基金资助:
    国家自然科学基金资助项目(61100185)

New forgery attack on the authenticated cipher SCREAM and iSCREAM

Yu-dan TIAN1,Yong-zhuang WEI2,3   

  1. 1 Guangxi Experiment Center of Information Sciences, Guilin University of Electronic Technology, Guilin 541004, China
    2 Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin 541004, China
    3 State Key Laboratory of Information Security, Institute of Information Engineering,Chinese Academy of Sciences, Beijing 100039, China
  • Revised:2015-11-20 Online:2016-01-01 Published:2016-02-16
  • Supported by:
    The National Natural Science Foundation of China(61100185)

摘要:

摘要:认证加密算法能同时提供信息的加解密及完整性检验两个功能,它已被广泛应用于各种网络安全系统中。最近伴随着欧洲CAESAR密码算法的征集活动,认证加密算法倍受业界关注。SCREAM算法凭借其新颖的设计理念和算法结构,已经顺利入围 CAESAR 竞选中的第二轮候选算法。而该算法是否存在新的安全性问题是目前的研究热点之一。基于 SCREAM 参数的变化特点,利用累加值碰撞的思想提出了一种新的伪造攻击。研究结果表明,新攻击成功的概率为 1,所需的时间复杂度及数据复杂度均可忽略;此外该攻击同样适用于SCREAM的一种变体算法,即iSCREAM。与已有的攻击相比较,新攻击所需的复杂度更低,攻击范围更灵活有效。

关键词: SCREAM, iSCREAM, 伪造攻击, CAESAR, 认证

Abstract:

Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of CAESAR cipher solicitation was developed. SCREAM had been selected as one of the second-round candidates in CAESAR competition because of its novel structure and design idea. Currently, the security issue of SCREAM becomes an interesting research topic. Based on the characteristic of SCREAM variable parameters, a new forgery attack was proposed by using the basic idea of the sum collision. In particular, this attack could also be used to iSCREAM algorithm. Different to the best known attacks, the new attack requires less time and data complexities. It is shown that this new attack is more flexible and effective. Furthermore, the success probability of the forgery will be one.

Key words: SCREAM, iSCREAM, forgery attack, CAESAR, authentication

中图分类号: 

No Suggested Reading articles found!