• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks


Abstract

The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions – TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
T. S. D. Phuc, Y. Shin, C. Lee, "Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks," KSII Transactions on Internet and Information Systems, vol. 15, no. 6, pp. 2148-2167, 2021. DOI: 10.3837/tiis.2021.06.012.

[ACM Style]
Tran Song Dat Phuc, Yong-Hyeon Shin, and Changhoon Lee. 2021. Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. KSII Transactions on Internet and Information Systems, 15, 6, (2021), 2148-2167. DOI: 10.3837/tiis.2021.06.012.

[BibTeX Style]
@article{tiis:24680, title="Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks", author="Tran Song Dat Phuc and Yong-Hyeon Shin and Changhoon Lee and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2021.06.012}, volume={15}, number={6}, year="2021", month={June}, pages={2148-2167}}