Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs  被引量:1

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs

在线阅读下载全文

作  者:Wei LI Vincent RIJMEN Zhi TAO Qingju WANG Hua CHEN Yunwen LIU Chaoyun LI Ya LIU 

机构地区:[1]School of Computer Science and Technology,Donghua University,Shanghai 201620,China [2]imec-COSIC,KU Leuven,Leuven 3000,Belgium [3]Shanghai Key Laboratory of Integrate Administration Technologies for Information Security,Shanghai 200240,China [4]Department of Computer Science and Engineering,Shanghai Jiao Tong University,Shanghai 200240,China [5]Department of Applied Mathematics and Computer Science,Technical University of Denmark,Kgs.Lyngby 2800,Denmark [6]Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China [7]College of Science,National University of Defense Technology,Changsha 410073,China [8]Department of Computer Science and Engineering,University of Shanghai for Science and Technology,Shanghai 200093,China

出  处:《Science China(Information Sciences)》2018年第3期114-126,共13页中国科学(信息科学)(英文版)

基  金:supported by Research Council KU Leuven(Grant No.OT/13/071);National Key Basic Research Program of China(Grant No.2013CB338004);National Natural Science Foundation of China(Grant Nos.61772129,61472250,61402286,61672347,61402288);Innovation Program of Shanghai Municipal Education Commission(Grant No.14ZZ066);Shanghai Natural Science Foundation(Grant Nos.15ZR1400300,16ZR1401100);European Union’s Horizon 2020 Research and Innovation Programme(Grant No.H2020-MSCA-ITN-2014-643161 ECRYPT-NET);Open Research Fund of State Key Laboratory of Information Security(Grant No.AGK20170X);National Cryptography Development Fund(Grant No.MMJJ20170214);Fundamental Research Funds for the Central Universities;China Scholarship Council(Grant No.CSC201403170380)

摘  要:With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing many serious traffic problems, such as road safety, convenience, and efficiency. To avoid any possible rancorous attacks, employing lightweight ciphers is most effective for implementing encryption/decryption, message authentication, and digital signatures for the security of the VANETs. Light encryption device(LED) is a lightweight block cipher with two basic keysize variants: LED-64 and LED-128. Since its inception, many fault analysis techniques have focused on provoking faults in the last four rounds to derive the 64-bit and 128-bit secret keys. It is vital to investigate whether injecting faults into a prior round enables breakage of the LED. This study presents a novel impossible meet-in-the-middle fault analysis on a prior round. A detailed analysis of the expected number of faults is used to uniquely determine the secret key. It is based on the propagation of truncated differentials and is surprisingly reminiscent of the computation of the complexity of a rectangle attack. It shows that the impossible meet-in-the-middle fault analysis could successfully break the LED by fault injections.With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing many serious traffic problems, such as road safety, convenience, and efficiency. To avoid any possible rancorous attacks, employing lightweight ciphers is most effective for implementing encryption/decryption, message authentication, and digital signatures for the security of the VANETs. Light encryption device(LED) is a lightweight block cipher with two basic keysize variants: LED-64 and LED-128. Since its inception, many fault analysis techniques have focused on provoking faults in the last four rounds to derive the 64-bit and 128-bit secret keys. It is vital to investigate whether injecting faults into a prior round enables breakage of the LED. This study presents a novel impossible meet-in-the-middle fault analysis on a prior round. A detailed analysis of the expected number of faults is used to uniquely determine the secret key. It is based on the propagation of truncated differentials and is surprisingly reminiscent of the computation of the complexity of a rectangle attack. It shows that the impossible meet-in-the-middle fault analysis could successfully break the LED by fault injections.

关 键 词:VANETS LED lightweight cipher impossible meet-in-the-middle fault analysis 

分 类 号:TN918.4[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象