Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery

Susila Windarta, Kalamullah Ramli, Dodi Sudiana

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Message Authentication Code (MAC) is a cryptographic hash function that uses the cryptographic key(s) to generate a MAC value or a tag. MAC security property that must be satisfied is the second preimage resistance; given an input, it is difficult to find different inputs with the same tag. A lightweight MAC called LIGHTMAC was introduced in 2016 by Luykx et al. The scheme uses lightweight block cipher as its encryption function. This paper discusses the application of a second preimage attack on the LIGHTMAC scheme using existential forgery methods. The purpose of this attack is to determine the resistance of LIGHTMAC's second preimage property. From observation and experiments with instantiation using SIMECK32/64, it is found that the attack is more efficient than brute force attacks with birthday attack complexity. Furthermore, a modification is recommended to avoid the second preimage attack on LIGHTMAC.

Original languageEnglish
Title of host publicationProceeding - 1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering, ICITAMEE 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages265-269
Number of pages5
ISBN (Electronic)9781728183091
DOIs
Publication statusPublished - 13 Oct 2020
Event1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering, ICITAMEE 2020 - Virtual, Yogyakarta, Indonesia
Duration: 13 Oct 202014 Oct 2020

Publication series

NameProceeding - 1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering, ICITAMEE 2020

Conference

Conference1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering, ICITAMEE 2020
CountryIndonesia
CityVirtual, Yogyakarta
Period13/10/2014/10/20

Keywords

  • existential forgery
  • LIGHTMAC
  • lightweight cryptography
  • Second preimage Attack
  • SIMECK32/64

Fingerprint Dive into the research topics of 'Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery'. Together they form a unique fingerprint.

Cite this