Paper
21 April 2022 Chosen-message forgery attack on SCREAM
Lipeng Chang, Yuechuan Wei, Shuiyu He, Xiangru Wang, Xiaozhong Pan
Author Affiliations +
Proceedings Volume 12175, International Conference on Network Communication and Information Security (ICNCIS 2021); 121750T (2022) https://doi.org/10.1117/12.2628554
Event: International Conference on Network Communication and Information Security (ICNCIS 2021), 2021, Beijing, China
Abstract
NIST launched the CAESAR competition for the world in 2014, followed by the current LWC competition. The design and security analysis on authenticated encryption (AE) algorithm have aroused a great upsurge in the world, aiming to meet the needs of the confidentiality and authenticity of the information. At the same time, all kinds of ingenious design and the corresponding security analysis emerged in endlessly. Although the SCREAM algorithm failed to be selected in the third round of CAESAR competition, based on its unique design, it still has a good reference and research significance to carry out safety analysis. In this thesis, according to the relative independence of each module of the SCREAM algorithm structure, the Chosen-message forgery attack of SCREAM was proposed under the condition of one or more pairs of ciphertext, so as to forge the ciphertext and generate the correct authentication tag to pass the verification. Meanwhile, the effectiveness of this method was proved, and the corresponding probability of success was provided. Compared with the existing analysis results, this method has better operability and universality.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lipeng Chang, Yuechuan Wei, Shuiyu He, Xiangru Wang, and Xiaozhong Pan "Chosen-message forgery attack on SCREAM", Proc. SPIE 12175, International Conference on Network Communication and Information Security (ICNCIS 2021), 121750T (21 April 2022); https://doi.org/10.1117/12.2628554
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Analytical research

Error control coding

Computer security

Data processing

Receivers

Safety

Standards development

RELATED CONTENT

ECC, RSA, and DSA analogies in applied mathematics
Proceedings of SPIE (April 22 2022)
Analysis on AES encryption standard and safety
Proceedings of SPIE (February 02 2023)
Network security situation based on big data environment
Proceedings of SPIE (October 20 2022)
Query evaluation on efficiently encoded GML streams
Proceedings of SPIE (November 03 2008)
The study of wlan security and its solution
Proceedings of SPIE (February 20 2006)

Back to Top