Title :
Misusing universal hash functions: security analysis of a hardware efficient stream cipher model using LFSR based hash function
Author :
Rizomiliotis, Panagiotis
Author_Institution :
Dep. of Inf. & Comm. Syst. Eng., Univ. of the Aegean, Karlovassi, Greece
Abstract :
Hardware efficient encryption algorithms are necessary for applications like low cost Radio Frequency Identification (RFID) tags. In order to keep the cost as low as possible, the designers of lightweight algorithms are using simplified versions of well studied components. Unfortunately, in most cases this simplification leads to weak constructions. In this paper, we investigate one such case. Recently, a low hardware complexity binary additive stream cipher was proposed in the Computers & Security journal. This stream cipher is based on a simplified version of a family of universal hash functions. The new family is called Toeplitz hash. The Toeplitz hash functions can be very efficiently implemented on hardware and for that the proposed stream cipher is suitable for low cost applications. However, we demonstrate that the security of the cipher is much weaker than it was claimed. More precisely, we introduce a known-plaintext attack that can retrieve the secret key with very low computational complexity that requires only a few known keystream bits by taking advantage of the low cost.
Keywords :
Toeplitz matrices; public key cryptography; radiofrequency identification; LFSR based hash function; RFID tags; Toeplitz hash functions; computational complexity; hardware complexity binary additive stream cipher; hardware efficient encryption algorithms; hardware efficient stream cipher model; keystream bits; radio frequency identification tags; security analysis; universal hash functions; Algorithm design and analysis; Computational complexity; Costs; Cryptography; Hardware; Information security; Linear feedback shift registers; National electric code; Radiofrequency identification; Systems engineering and theory;
Conference_Titel :
Information Theory (ITW 2010, Cairo), 2010 IEEE Information Theory Workshop on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-6372-5
DOI :
10.1109/ITWKSPS.2010.5503170