Security problems with improper implementations of improved FEA-M
Li, SJ and Lo, K-T (2007) Security problems with improper implementations of improved FEA-M Journal of Systems and Software, 80 (5). pp. 791-794.
JSS2007.pdf - Accepted version Manuscript
Available under License : See the attached licence file.
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-dependent differential chosen-plaintext attack or its chosen-ciphertext counterpart can reveal the secret key of the cryptosystem, if the involved (pseudo-)random process can be tampered (for example, through a public time service). The implementation-dependent differential attack is very efficient in complexity and needs only O(n2) chosen plaintext or ciphertext bits. In addition, this paper also points out a minor security problem with the selection of the session key. In real implementations of the cryptosystem, these security problems should be carefully avoided, or the cryptosystem has to be further enhanced to work under such weak implementations.
|Divisions :||Faculty of Engineering and Physical Sciences > Computing Science|
|Identification Number :||10.1016/j.jss.2006.05.002|
|Related URLs :|
|Additional Information :||NOTICE: this is the author’s version of a work that was accepted for publication in Journal of Systems and Software. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Journal of Systems and Software, 80(5), 2007, DOI 10.1016/j.jss.2006.05.002.|
|Depositing User :||Symplectic Elements|
|Date Deposited :||30 May 2012 21:05|
|Last Modified :||23 Sep 2013 19:26|
Actions (login required)
Downloads per month over past year