DocumentCode :
3074717
Title :
Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes
Author :
Chai, Qi ; Gong, Guang
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
fYear :
2011
fDate :
5-9 Dec. 2011
Firstpage :
1
Lastpage :
6
Abstract :
In GLOBECOM´10, Adamo et. al. proposed an interesting encryption scheme, called Error Correction-Based Cipher (ECBC), working at the physical layer. This scheme, together with its ancestor, Secret Error Correcting Code (SECC), belongs to the family of Joint Encryption and Error Correction (JEEC), which combines error correction and data encryption as one process to enable efficient implementations. In this paper, we provide rigorous investigation on the security of ECBC and SECC to unveil their cryptographic strengths under chosen-plaintext attacks. For ECBC, we found a 3-stage differential-style attack, which breaks the scheme with O(k × 2deg(f) + 2k) effort, where deg(f) is the degree of the core cryptographic function f. For SECC, we found a similar attack of complexity O(k × 2k+1). Both of the attacks are significantly improved from exhaustive search, e.g., O(22k+kn+n × 2k) for ECBC and O(2kn+ (k+n) × 2k) for SECC. In addition, we exhibit that f used in ECBC´s implementation is particularly vulnerable to our attack, which allows the attacker to recover the secret generator matrix in O(1). To mitigate this vulnerability, we propose a secure yet lightweight construction of f achieving the maximum degree. Finally, the core part of our attack against ECBC has been implemented utilizing GPU acceleration and demonstrated on a cluster GPU instance provided by Amazon EC2. Experimental results confirm that the original implementation of ECBC scheme can be broken in (almost) constant time (<;0.4 second) regardless of k, whereas the ECBC scheme enhanced by our proposed f can withstand this attack to the maximum extent.
Keywords :
cryptography; error correction codes; matrix algebra; ECBC; GPU acceleration; JEEC; SECC; data encryption; differential cryptanalysis; differential-style attack; error correction schemes; error correction-based cipher; joint encryption schemes; secret error correcting code; secret generator matrix; Boolean functions; Complexity theory; Encryption; Equations; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE
Conference_Location :
Houston, TX, USA
ISSN :
1930-529X
Print_ISBN :
978-1-4244-9266-4
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2011.6133864
Filename :
6133864
Link To Document :
بازگشت