Abstract
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ågren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of grain-128 with optional authentication. International Journal of Wireless and Mobile Computing 5(1), 48–59 (2011)
Braeken, A., Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: SFINKS: A Synchronous Stream Cipher for Restricted Hardware Environments. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/026 (2005), http://www.ecrypt.eu.org/stream
ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 4: Design and Evaluation Report. Tech. rep., ETSI (August 11, 2010)
ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. Tech. rep., ETSI (January 4, 2011), http://gsmworld.com/documents/EEA3_EIA3_specification_v1_5.pdf
ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC Specification. Tech. rep., ETSI (January 4, 2011), http://gsmworld.com/documents/EEA3_EIA3_ZUC_v1_5.pdf
European Network of Excellence for Cryptology: The eSTREAM Project (2008), http://www.ecrypt.eu.org/stream/index.html
Fuhr, T., Gilbert, H., Reinhard, J.-R., Videau, M.: Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 230–242. Springer, Heidelberg (2012)
Golić, J.D.: Modes of Operation of Stream Ciphers. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 233–247. Springer, Heidelberg (2001)
Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing 2(1), 86–93 (2007)
Lai, X., Rueppel, R., Woollven, J.: A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 339–348. Springer, Heidelberg (1993)
Nakano, Y., Cid, C., Fukushima, K., Kiyomoto, S.: Analysis of Message Injection in Stream Cipher-Based Hash Functions. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 498–513. Springer, Heidelberg (2011)
Nakano, Y., Kurihara, J., Kiyomoto, S., Tanaka, T.: On a construction of stream-cipher-based hash functions. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1–11. IEEE (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
ALMashrafi, M., Bartlett, H., Simpson, L., Dawson, E., Wong, K.KH. (2012). Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. In: Susilo, W., Mu, Y., Seberry, J. (eds) Information Security and Privacy. ACISP 2012. Lecture Notes in Computer Science, vol 7372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31448-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-31448-3_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31447-6
Online ISBN: 978-3-642-31448-3
eBook Packages: Computer ScienceComputer Science (R0)