首页> 外文会议>Association for Computing Machinery Conference on Computer and Communications Security >Attacking Cryptographic Schemes Based on 'Perturbation Polynomials'
【24h】

Attacking Cryptographic Schemes Based on 'Perturbation Polynomials'

机译:基于“扰动多项式”攻击加密方案

获取原文

摘要

We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use "perturbation polynomials" to add "noise" to polynomial-based systems that offer information-theoretic security, in an attempt to increase the resilience threshold while maintaining efficiency. We show that the heuristic security arguments given for these modified schemes do not hold, and that they can be completely broken once we allow even a slight extension of the parameters beyond those achieved by the underlying information-theoretic schemes. Our attacks apply to the key predistribution scheme of Zhang et al. (MobiHoc 2007), the access-control schemes of Subramanian et al. (PerCom 2007), and the authentication schemes of Zhang et al. (INFOCOM 2008). Our results cast doubt on the viability of using "perturbation polynomials" for designing secure cryptographic schemes.
机译:我们展示了最近提出的几种加密计划,以便在传感器网络中实现各种安全目标。 粗略地说,这些方案都使用“扰动多项式”将“噪声”添加到基于多项式的系统,提供信息理论安全性,以试图在保持效率的同时增加弹性阈值。 我们表明,一旦我们允许超出基础信息 - 理论方案实现的参数甚至略微扩展,它们可以完全破坏所提供的这些修改方案的启发式安全参数。 我们的攻击适用于张等人的关键预分析方案。 (Mobihoc 2007),Subramanian等人的访问控制方案。 (Percom 2007),以及张等人的认证方案。 (Infocom 2008)。 我们的结果对使用“扰动多项式”设计安全加密方案的可行性令人疑问。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号