首页 | 本学科首页   官方微博 | 高级检索  
     


Practical attack on NLM-MAC scheme
Authors:Mohammad Ali Orumiehchiha  Josef Pieprzyk  Ron Steinfeld
Affiliation:1. Center for Advanced Computing – Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109, Australia;2. Center for Information Security, School of Electrical Engineering and Computer Science, Queensland University of Technology, Brisbane, QLD 4000, Australia;3. Clayton School of Information Technology, Monash University, Clayton, VIC 3800, Australia
Abstract:The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols.
Keywords:Cryptography  NLM stream cipher  MAC function  Cryptanalysis  Key recovery attack  Forgery attack
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号