Slide 21
Slide 21 text
Takanori Isobe, Ryoma Ito, Kazuhiko Minemastu ESORICS 2021, October 7, 2021.
Security Analysis of SFrame
Result 2: Security of AES-CM-HMAC with Short Tags
21
Target member
An impersonation attack by a malicious group member
n exploits a vulnerability of very short tag length
n caused by the digital signature Sig computed only a list of AEAD tags
๐, aad, ๐ช!, ๐ป!, Sig ๐, aad, ๐ชโ, ๐ปโฒ, Sig
๐ถ ๐
โฎ โฎ
๐ถโ ๐โ
โฎ โฎ
= ๐ปโฒ
Security Analysis
Other members
Malicious member
Online phase
1. intercepts a target frame ๐, aad, ๐ถ,, ๐,, Sig sent by the target member
2. searches a tuple ๐โ, ๐ถโ, ๐โ in the table such that ๐โ = ๐, and ๐ถโ โ ๐ถ,
3. finds such a tuple, replaces ๐ถ, with ๐ถโ in the target frame, and sends
๐, ๐๐๐, ๐ถโ, ๐โฒ, Sig to other group members
When the tag length is 4 bytes,
if the adversary prepares 232
tuples in the table, the success
probability is almost one.