Security Problems with Improper Implementations of Improved FEA-M

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

8 pages, elsart.cls

Scientific paper

10.1016/j.jss.2006.05.002

This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-dependent differential chosen-plaintext attack or its chosen-ciphertext counterpart can reveal the secret key of the cryptosystem, if the involved (pseudo-)random process can be tampered (for example, through a public time service). The implementation-dependent differential attack is very efficient in complexity and needs only $O(n^2)$ chosen plaintext or ciphertext bits. In addition, this paper also points out a minor security problem with the selection of the session key. In real implementations of the cryptosystem, these security problems should be carefully avoided, or the cryptosystem has to be further enhanced to work under such weak implementations.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Security Problems with Improper Implementations of Improved FEA-M does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Security Problems with Improper Implementations of Improved FEA-M, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security Problems with Improper Implementations of Improved FEA-M will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-703630

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.