Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/26332
Title: Security problems with improper implementations of improved FEA-M
Authors: Li, S
Lo, KT 
Keywords: Chosen-ciphertext attack
Chosen-plaintext attack
Differential attack
FEA-M
Insecure implementation
Multimedia encryption
Pseudo-random process
Issue Date: 2007
Publisher: Elsevier
Source: Journal of systems and software, 2007, v. 80, no. 5, p. 791-794 How to cite?
Journal: Journal of systems and software 
Abstract: This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-dependent differential chosen-plaintext attack or its chosen-ciphertext counterpart can reveal the secret key of the cryptosystem, if the involved (pseudo-)random process can be tampered (for example, through a public time service). The implementation-dependent differential attack is very efficient in complexity and needs only O(n2) chosen plaintext or ciphertext bits. In addition, this paper also points out a minor security problem with the selection of the session key. In real implementations of the cryptosystem, these security problems should be carefully avoided, or the cryptosystem has to be further enhanced to work under such weak implementations.
URI: http://hdl.handle.net/10397/26332
ISSN: 0164-1212
DOI: 10.1016/j.jss.2006.05.002
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

5
Last Week
0
Last month
0
Citations as of Sep 15, 2017

WEB OF SCIENCETM
Citations

6
Last Week
0
Last month
0
Citations as of Sep 22, 2017

Page view(s)

29
Last Week
0
Last month
Checked on Sep 18, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.