Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes

In GLOBECOM'10, Adamo et. al. proposed an interesting encryption scheme, called Error Correction-Based Cipher (ECBC), working at the physical layer. This scheme, together with its ancestor, Secret Error Correcting Code (SECC), belongs to the family of Joint Encryption and Error Correction (JEEC), which combines error correction and data encryption as one process to enable efficient implementations. In this paper, we provide rigorous investigation on the security of ECBC and SECC to unveil their cryptographic strengths under chosen-plaintext attacks. For ECBC, we found a 3-stage differential-style attack, which breaks the scheme with $O(k \times 2^{deg(f)} + 2^k)$ effort, where $deg(f)$ is the degree of the core cryptographic function $f$. For SECC, we found a similar attack of complexity $O(k \times 2^{k+1})$. Both of the attacks are significantly improved from exhaustive search, e.g., $O(2^{2k+kn+n\times2^k})$ for ECBC and $O(2^{kn+ (k+n) \times 2^k})$ for SECC. In addition, we exhibit that $f$ used in ECBC's implementation is particularly vulnerable to our attack, which allows the attacker to recover the secret generator matrix in $O(1)$. To mitigate this vulnerability, we propose a secure yet lightweight construction of $f$ achieving the maximum degree. Finally, the core part of our attack against ECBC has been implemented utilizing GPU acceleration and demonstrated on a cluster GPU instance provided by Amazon EC2. Experimental results confirm that the original implementation of ECBC scheme can be broken in (almost) constant time (${<}0.4$ second) regardless of $k$, whereas the ECBC scheme enhanced by our proposed $f$ can withstand this attack to the maximum extent.

[1]  Guang Gong,et al.  A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[2]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[3]  Claude Carlet,et al.  Vectorial Boolean Functions for Cryptography , 2006 .

[4]  V. F. Kolchin,et al.  Random Graphs: Contents , 1998 .

[5]  T. R. N. Rao,et al.  Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.

[6]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[7]  Shengli Fu,et al.  Physical Layer Error Correction Based Cipher , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[8]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[9]  Chung-Huang Yang,et al.  Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes , 2001, ICICS.

[10]  Murali Varanasi,et al.  Joint scheme for physical layer error correction and security , 2011 .

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  André Zúquete,et al.  Physical-layer encryption with stream ciphers , 2008, 2008 IEEE International Symposium on Information Theory.

[13]  J.-M. Goethals,et al.  IEEE international symposium on information theory , 1981 .

[14]  Tzonelih Hwang,et al.  Secret Error-Correcting Codes (SECC) , 1990 .

[15]  René Struik,et al.  The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack , 1987, CRYPTO.