In this paper we analyse three authenticated encryption schemes, CMBC-MAC, SCMA and CBC-X, which were proposed for wireless sensor networks (WSN). Our research shows that these three schemes all have serious security problems either in authenticity or in privacy. More specifically, we only need one query to break the authenticity of CMBC-MAC and SCMA with success probability of 1. Meanwhile, we only need one query of block length of at least three to break the authenticity of CBC-X with success probability of 0.63, and we need two queries to break the privacy of CBC-X with success probability of 1 - 2 -64.
CITATION STYLE
Li, X., Wang, P., Li, B., & Sun, Z. (2014). Cryptanalysis of three authenticated encryption schemes for wireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8567, pp. 395–406). Springer Verlag. https://doi.org/10.1007/978-3-319-12087-4_25
Mendeley helps you to discover research relevant for your work.