New forgery attack on the authenticated cipher SCREAM and iSCREAM

Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu-dan TIAN, Yong-zhuang WEI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-01-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00012
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530359004528640
author Yu-dan TIAN
Yong-zhuang WEI
author_facet Yu-dan TIAN
Yong-zhuang WEI
author_sort Yu-dan TIAN
collection DOAJ
description Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of CAESAR cipher solicitation was developed. SCREAM had been selected as one of the second-round candidates in CAESAR competition because of its novel structure and design idea. Currently, the security issue of SCREAM becomes an interesting research topic. Based on the characteristic of SCREAM variable parameters, a new forgery attack was proposed by using the basic idea of the sum collision. In particular, this attack could also be used to iSCREAM algorithm. Different to the best known attacks, the new attack requires less time and data complexities. It is shown that this new attack is more flexible and effective. Furthermore, the success probability of the forgery will be one.
format Article
id doaj-art-329f3f4c6d8c47d0a53022ac4e4d771d
institution Kabale University
issn 2096-109X
language English
publishDate 2016-01-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-329f3f4c6d8c47d0a53022ac4e4d771d2025-01-15T03:04:19ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-01-012606559542976New forgery attack on the authenticated cipher SCREAM and iSCREAMYu-dan TIANYong-zhuang WEIAuthentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of CAESAR cipher solicitation was developed. SCREAM had been selected as one of the second-round candidates in CAESAR competition because of its novel structure and design idea. Currently, the security issue of SCREAM becomes an interesting research topic. Based on the characteristic of SCREAM variable parameters, a new forgery attack was proposed by using the basic idea of the sum collision. In particular, this attack could also be used to iSCREAM algorithm. Different to the best known attacks, the new attack requires less time and data complexities. It is shown that this new attack is more flexible and effective. Furthermore, the success probability of the forgery will be one.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00012SCREAMiSCREAMforgery attackCAESARauthentication
spellingShingle Yu-dan TIAN
Yong-zhuang WEI
New forgery attack on the authenticated cipher SCREAM and iSCREAM
网络与信息安全学报
SCREAM
iSCREAM
forgery attack
CAESAR
authentication
title New forgery attack on the authenticated cipher SCREAM and iSCREAM
title_full New forgery attack on the authenticated cipher SCREAM and iSCREAM
title_fullStr New forgery attack on the authenticated cipher SCREAM and iSCREAM
title_full_unstemmed New forgery attack on the authenticated cipher SCREAM and iSCREAM
title_short New forgery attack on the authenticated cipher SCREAM and iSCREAM
title_sort new forgery attack on the authenticated cipher scream and iscream
topic SCREAM
iSCREAM
forgery attack
CAESAR
authentication
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00012
work_keys_str_mv AT yudantian newforgeryattackontheauthenticatedcipherscreamandiscream
AT yongzhuangwei newforgeryattackontheauthenticatedcipherscreamandiscream