【24h】

A Simple Key-Recovery Attack on McOE-X

机译:对McOE-X的简单密钥恢复攻击

获取原文

摘要

In this paper, we present a key-recovery attack on the online authenticated encryption scheme McOE-X proposed by Fleischmann et al. at FSE 2012. The attack is based on the observation that in McOE-X the key is changed for every block of message that is encrypted in a deterministic way. This allows an adversary to recover the key by using a standard time-memory trade-off strategy. On its best setting the attack has a complexity as low as 2 · 2~(n/2), while this should be 2~n for a good scheme. Taking AES-128 as an example this would result in an attack with complexity of 2~(65).
机译:在本文中,我们提出了对Fleischmann等人提出的在线身份验证加密方案McOE-X的密钥恢复攻击。该攻击是基于以下观察结果:在McOE-X中,对于以确定性方式加密的每个消息块,密钥都会更改。这使对手可以通过使用标准的时间权衡策略来恢复密钥。在最佳状态下,攻击的复杂度低至2·2〜(n / 2),而对于一个好的方案,它的复杂度应为2〜n。以AES-128为例,这将导致攻击的复杂度为2〜(65)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号