Cryptanalysis of three authenticated encryption schemes for wireless sensor networks

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of 1 - 2 -64.

Cite

CITATION STYLE

APA

Li, X., Wang, P., Li, B., & Sun, Z. (2014). Cryptanalysis of three authenticated encryption schemes for wireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8567, pp. 395–406). Springer Verlag. https://doi.org/10.1007/978-3-319-12087-4_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free