Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (1): 60-65.doi: 10.11959/j.issn.2096-109x.2016.00012

• Papers • Previous Articles     Next Articles

New forgery attack on the authenticated cipher SCREAM and iSCREAM

Yu-dan TIAN1,Yong-zhuang WEI2,3   

  1. 1 Guangxi Experiment Center of Information Sciences, Guilin University of Electronic Technology, Guilin 541004, China
    2 Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin 541004, China
    3 State Key Laboratory of Information Security, Institute of Information Engineering,Chinese Academy of Sciences, Beijing 100039, China
  • Revised:2015-11-20 Online:2016-01-01 Published:2016-02-16
  • Supported by:
    The National Natural Science Foundation of China(61100185)

Abstract:

Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of CAESAR cipher solicitation was developed. SCREAM had been selected as one of the second-round candidates in CAESAR competition because of its novel structure and design idea. Currently, the security issue of SCREAM becomes an interesting research topic. Based on the characteristic of SCREAM variable parameters, a new forgery attack was proposed by using the basic idea of the sum collision. In particular, this attack could also be used to iSCREAM algorithm. Different to the best known attacks, the new attack requires less time and data complexities. It is shown that this new attack is more flexible and effective. Furthermore, the success probability of the forgery will be one.

Key words: SCREAM, iSCREAM, forgery attack, CAESAR, authentication

CLC Number: 

No Suggested Reading articles found!