Cryptanalysis of the m-Permutation Protection Schemes
نویسندگان
چکیده
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP’98, Fung and Gray proposed an − m permutation protection scheme against the EEPROM modification attack. At ACISP’99, Fung and Gray pointed out that in their original scheme, a secret key with too small or too large Hamming weight could be recovered easily. Then they proposed a revised − m permutation protection scheme and claimed that their revised scheme does not leak any information of the secret key. In this paper, we break completely both the original and the revised − m permutation protection schemes. The original scheme is broken with about n 2 log 2 devices from the same batch and about n m n × × + ) 2 log 3 ( 2 probes ( n is the length of the secret key and m is the amount of permutations). The revised − m permutation protection scheme is more vulnerable than the original one. It could be broken with only one device and about 3 / 3 n m × probes.
منابع مشابه
Artemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملA Novel Method to Design S-Boxes Based on Key-Dependent Permutation Schemes and its Quality Analysis
S-boxes are used in block ciphers as the important nonlinear components. The nonlinearity provides important protection against linear and differential cryptanalysis. The Sboxes used in encryption process could be chosen to be keydependent. In this paper, we have presented four simple algorithms for generation key-dependent S-boxes. For quality analysis of the key-dependent S-boxes, we have pro...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملImproved Differential Cryptanalysis on Generalized Feistel Schemes
Nachef et al [12] used differential cryptanalysis to study four types of Generalized Feistel Scheme (GFS). They gave the lower bound of maximum number of rounds that is indistinguishable from a random permutation. In this paper, we study the security of several types of GFS by exploiting the asymmetric property. We show that better lower bounds can be achieved for the Type-1 GFS, Type-3 GFS and...
متن کاملAn Efficient Medical Image Cryptosystem Based on Chaotic Maps
With the growing applications of digital images in medical health system and the development of computer networks, medical image encryption has become an important technology to protect patients’ privacy when it is transmitted over open networks. Recently, chaos-based encryption approaches have been proven to be more effective for image encryption than other traditional methods (e.g. IDEA and A...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000