[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3212480.3212482acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Lightweight Message Authentication for Constrained Devices

Published: 18 June 2018 Publication History

Abstract

Message Authentication Codes (MACs) used in today's wireless communication standards may not be able to satisfy resource limitations of simpler 5G radio types and use cases such as machine type communications. As a possible solution, we present a lightweight message authentication scheme based on the cyclic redundancy check (CRC). It has been previously shown that a CRC with an irreducible generator polynomial as the key is an ϵ-almost XOR-universal (AXU) hash function with ϵ = (m + n)/2n-1, where m is the message size and n is the CRC size. While the computation of n-bit CRCs can be efficiently implemented in hardware using linear feedback shift registers, generating random degree-n irreducible polynomials is computationally expensive for large n. We propose using a product of k irreducible polynomials whose degrees sum up to n as a generator polynomial for an n-bit CRC and show that the resulting hash functions are ϵ-AXU with ϵ = (m + n)k/2n-k. The presented message authentication scheme can be seen as providing a trade-off between security and implementation efficiency.

References

[1]
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. 1996. Keying Hash Functions for Message Authentication. In Advances in Cryptology - CRYPTO'96, Neal Koblitz (Ed.). LNCS, Vol. 1109. Springer Berlin Heidelberg, 1--15.
[2]
Mihir Bellare, Joe Kilian, and Phillip Rogaway. 1994. The Security of Cipher Block Chaining. In Advances in Cryptology - CRYPTO'94, Yvo G. Desmedt (Ed.). LNCS, Vol. 839. Springer Berlin Heidelberg, 341--358.
[3]
Claude Berrou. 2011. Codes and turbo codes. Springer Science & Business Media.
[4]
Jesper Birch, Lars Gylling Christensen, and Morton Skov. 1992. A Programmable 800 Mbit/s CRC Check/Generator Unit for LANs and MANs. Comput. Netw. ISDN Syst. 24, 2 (April 1992), 109--118.
[5]
Gilles Brassard. 1983. On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys. In Advances in Cryptology, David Chaum, Ronald L. Rivest, and Alan T. Sherman (Eds.). Springer US, 79--86.
[6]
Richard P. Brent and Paul Zimmermann. 2008. Three Ways to Test Irreducibility. http://maths-people.anu.edu.au/~brent/pd/MASCOS02t4.pdf.
[7]
Yvo Desmedt. 1986. Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences. In Advances in Cryptology - CRYPTO'85, Hugh C. Williams (Ed.). LNCS, Vol. 218. Springer Berlin Heidelberg, 42--55.
[8]
Yevgeniy Dodis. 2013. Randomness in Cryptography. http://cs.nyu.edu/~dodis/randomness-in-crypto/.
[9]
Elena Dubrova, Mats Naslund, and Goran Selander. 2015. CRC-Based Message Authentication for 5G Mobile Technology. In Proceedings of 1st IEEE International Workshop on 5G Security.
[10]
Elena Dubrova, Mats Näslund, Göran Selander, and Fredrik Lindqvist. 2018. Message Authentication Based on Crypto graphic ally Secure CRC without Polynomial Irreducibility Test. Cryptography and Communications 10 (March 2018), 383--399. Issue 2.
[11]
Ericsson. 2015. 5G security. www.ericsson.com/res/docs/whitepapers/5G-security.pdf.
[12]
Niels Ferguson. 2005. Authentication weaknesses in GCM. csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/CWC-GCM/Ferguson2.pdf.
[13]
Shuhong Gao and Daniel Panario. 1997. Tests and Constructions of Irreducible Polynomials over Finite Fields. In Foundations of Computational Mathematics, Felipe Cucker and Michael Shub (Eds.). Springer Berlin Heidelberg, 346--361.
[14]
S.W. Golomb. 1982. Shift Register Sequences. Aegean Park Press.
[15]
P. Koopman and T. Chakravarty. 2004. Cyclic redundancy code (CRC) polynomial selection for embedded networks. In Dependable Systems and Networks, 2004 International Conference on. 145--154.
[16]
Hugo Krawczyk. 1994. LFSR-based Hashing and Authentication. In Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'94). Springer-Verlag, London, UK, 129--139.
[17]
National Institute of Standards and Technology. 2015. FIPS PUB 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf.
[18]
T.-B. Pei and C. Zukowski. 1992. High-speed parallel CRC circuits in VLSI. IEEE Transactions on Communications 40, 4 (Apr. 1992), 653--657.
[19]
W.W. Peterson and D.T. Brown. 1961. Cyclic Codes for Error Detection. Proceedings of the IRE 49, 1 (Jan. 1961), 228--235.
[20]
M. Rabin. 1981. Fingerprinting by random polynomials. Technical Report TR-15-81. Center for Research in Computing Technology, Harvard Univ., Cambridge.
[21]
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, and Ivan Seskar. 2010. Security and Privacy Vulnerabilities of In-car Wireless Networks: A Tire Pressure Monitoring System Case Study. In 19th USENIX Conference on Security. Berkeley, CA, USA, 21--21.
[22]
Statista. 2018. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/.
[23]
D. R. Stinson. 1994. Universal Hashing and Authentication Codes. Des. Codes Cryptography 4, 4 (Oct. 1994), 369--380.
[24]
W. Trappe, R. Howard, and R. S. Moore. 2015. Low-Energy Security: Limits and Opportunities in the Internet of Things. IEEE Security Privacy 13, 1 (2015), 14--21.
[25]
Mark N. Wegman and J. Lawrence Carter. 1981. New hash functions and their use in authentication and set equality. J. Comput. System Sci. 22, 3 (1981), 265--279.
[26]
Yang Yu. 2017. Evaluation of Cryptographic CRC in 65nm CMOS. M. Sc. Thesis, Royal Institute of Technology (KTH), Sweden.

Cited By

View all
  • (2023)QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-LearningAd Hoc Networks10.1016/j.adhoc.2023.103118142(103118)Online publication date: Apr-2023
  • (2022)A lightweight encryption and message authentication framework for wireless communicationIET Communications10.1049/cmu2.1253517:3(265-278)Online publication date: 8-Nov-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
June 2018
317 pages
ISBN:9781450357319
DOI:10.1145/3212480
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CRC
  2. Universal hashing
  3. data integrity
  4. message authentication

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

WiSec '18
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-LearningAd Hoc Networks10.1016/j.adhoc.2023.103118142(103118)Online publication date: Apr-2023
  • (2022)A lightweight encryption and message authentication framework for wireless communicationIET Communications10.1049/cmu2.1253517:3(265-278)Online publication date: 8-Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media