Breaking NLM-MAC Generator

NLM generator, designed by HoonJae Lee, SangMin Sung, HyeongRag Kim, is the strengthened version of the LM-type summation generator with two memory bits; which uses non-linear combination of linear feedback shift register and non-linear feedback shift register. Recently, the cipher along with a massage authenticate function have been proposed for a lightweight communication framework in wireless sensor networks. Also, the generator has been used in two different RFID mutual authentication protocols and a protocol to secure access in internet. This paper indicates some critical cryptographic weak points leading to the key recovery and forgery attack. We prove the internal state of NLMn can be recovered with time complexity about nlog7×2 where the total length of internal state is 2 · n + 2 bits. The attack needs about n keystream bits. We also show attacker is able forge any MAC tag in real time by having only one pair (MAC tag, cipher-text). The proposed attacks are completely practical and break the scheme with negligible error probability.

[1]  Ingrid Verbauwhede,et al.  SFINKS: A synchronous stream cipher for restricted hardware environments , 2005 .

[2]  Simon J. Shepherd,et al.  Cryptanalysis of a summation generator with 2-bit memory , 2002, Signal Process..

[3]  Young Sil Lee,et al.  RFID mutual authentication protocol with Unclonable RFID-tags , 2011, International Conference on Mobile IT Convergence.

[4]  Hoon-Jae Lee,et al.  NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks , 2012 .

[5]  HyeongRag Kim,et al.  NLM-128, an Improved LM-Type Summation Generator with 2-Bit memories , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[6]  Lee-Ming Cheng,et al.  Correlation properties of an improved summation generator with 2-bit memory , 2002, Signal Process..

[7]  HoonJae Lee,et al.  Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher , 2011, ICHIT.

[8]  Bartosz Zoltak,et al.  VMPC One-Way Function and Stream Cipher , 2004, FSE.

[9]  Bruce Schneier,et al.  Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.

[10]  Young-Sil Lee,et al.  Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[11]  Daewan Han,et al.  An algebraic attack on the improved summation generator with 2-bit memory , 2005, Inf. Process. Lett..

[12]  Hoon-Jae Lee,et al.  On an improved summation generator with 2-bit memory , 2000, Signal Process..