Cube-type algebraic attacks on wireless encryption protocols
Michael, James Bret
MetadataShow full item record
In this study, we investigated an algebraic-type attack, known as the cube attack, against wireless networks. We implemented the cube attack in a wireless system, namely Bluetooth. We formally modeled the encryption function of E0 Bluetooth key generator and automated the process of the cube attack on E0 of the factorization process (preprocessing phase). In this phase, an attacker finds as many maxterms (a term of the encryption function such that its co-factor is a linear nonconstant polynomial) as possible. In the actual attacking phase, the attacker solves the system of linear equations through a chosen plaintext attack and reveals useful information about the cryptosystem. The number of operations needed in the computational process is 221.1 and is considerably less than that of similar algebraic types of attacks, but it is limited to the output of the LFSRs at any clock cycle. The results of our analysis indicate that if an attacker is an unauthorized participant of the security protocol, then by manipulating some of the output bits of the LFSRs of two arbitrary clock cycles and intercepting the output bits of the entire machine the attacker then succeeds in finding the output bits of the LFSRs at any clock tick.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003-06);The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ...
An analytical approach to assessing the vulnerability of bomb shelters to aerial bombing and artillery attack Yeo, Gim Koon. (Monterey, California. Naval Postgraduate School, 1993-09);This study examines the vulnerability of bomb shelters to aerial bombing and artillery attack, by modelling the bomb dump, i.e., the area within which the bomb shelters are located, as a cellular target. The stochastic ...
Ausdemore, Steven E. (Monterey, California: Naval Postgraduate School, 2015-09);The Newtown Connecticut school attack at the Sandy Hook elementary school on December 14, 2012, was another example of the tragedy of mass murder. When a targeted attack occurs, the victims must await the arrival of law ...