Security Analysis of the Whirlpool Hash Function in the Cloud of Things

With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intell...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:KSII transactions on Internet and information systems 2017-01, Vol.11 (1), p.536-551
Hauptverfasser: Li, Wei, Gao, Zhiyong, Gu, Dawu, Ge, Chenyu, Liao, Linfeng, Zhou, Zhihong, Liu, Ya, Liu, Zhiqiang
Format: Artikel
Sprache:kor
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 551
container_issue 1
container_start_page 536
container_title KSII transactions on Internet and information systems
container_volume 11
creator Li, Wei
Gao, Zhiyong
Gu, Dawu
Ge, Chenyu
Liao, Linfeng
Zhou, Zhihong
Liu, Ya
Liu, Zhiqiang
description With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.
format Article
fullrecord <record><control><sourceid>kiss_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO201711656707186</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><kiss_id>3531777</kiss_id><sourcerecordid>3531777</sourcerecordid><originalsourceid>FETCH-LOGICAL-k506-13e9d08a8e503aceeb7b47e9838748cfd794895f995ce2feff171c7220e633933</originalsourceid><addsrcrecordid>eNpNzE1LwzAcBvAgCo65T-AlF4-FvDT5J8dS3KYOdrDgsaRpYsNqOpr20G_vfEE8PQ88P54rtKIaZAYM4Ppfv0WblEJDKFNM5kqt0O7V2XkM04KLaPolhYQHj6fO4bcujP15GHq8N6nD2znaKQwRh_g9l_0wt1-26kJ8T3foxps-uc1vrlG1fazKfXY47p7K4pCdBJEZ5U63RBnlBOHGOtdAk4PTiivIlfUt6Fxp4bUW1jHvvKdALTBGnORcc75GDz-3p5CmUMc29fVz8XJk5AKpFBIIUCUv7v7Ppfo8hg8zLjUXnAIA_wTORVCE</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Security Analysis of the Whirlpool Hash Function in the Cloud of Things</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Li, Wei ; Gao, Zhiyong ; Gu, Dawu ; Ge, Chenyu ; Liao, Linfeng ; Zhou, Zhihong ; Liu, Ya ; Liu, Zhiqiang</creator><creatorcontrib>Li, Wei ; Gao, Zhiyong ; Gu, Dawu ; Ge, Chenyu ; Liao, Linfeng ; Zhou, Zhihong ; Liu, Ya ; Liu, Zhiqiang</creatorcontrib><description>With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><language>kor</language><publisher>한국인터넷정보학회</publisher><subject>Cloud of Things ; Fault Analysis ; Hash Function ; Whirlpool</subject><ispartof>KSII transactions on Internet and information systems, 2017-01, Vol.11 (1), p.536-551</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885</link.rule.ids></links><search><creatorcontrib>Li, Wei</creatorcontrib><creatorcontrib>Gao, Zhiyong</creatorcontrib><creatorcontrib>Gu, Dawu</creatorcontrib><creatorcontrib>Ge, Chenyu</creatorcontrib><creatorcontrib>Liao, Linfeng</creatorcontrib><creatorcontrib>Zhou, Zhihong</creatorcontrib><creatorcontrib>Liu, Ya</creatorcontrib><creatorcontrib>Liu, Zhiqiang</creatorcontrib><title>Security Analysis of the Whirlpool Hash Function in the Cloud of Things</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.</description><subject>Cloud of Things</subject><subject>Fault Analysis</subject><subject>Hash Function</subject><subject>Whirlpool</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNpNzE1LwzAcBvAgCo65T-AlF4-FvDT5J8dS3KYOdrDgsaRpYsNqOpr20G_vfEE8PQ88P54rtKIaZAYM4Ppfv0WblEJDKFNM5kqt0O7V2XkM04KLaPolhYQHj6fO4bcujP15GHq8N6nD2znaKQwRh_g9l_0wt1-26kJ8T3foxps-uc1vrlG1fazKfXY47p7K4pCdBJEZ5U63RBnlBOHGOtdAk4PTiivIlfUt6Fxp4bUW1jHvvKdALTBGnORcc75GDz-3p5CmUMc29fVz8XJk5AKpFBIIUCUv7v7Ppfo8hg8zLjUXnAIA_wTORVCE</recordid><startdate>20170130</startdate><enddate>20170130</enddate><creator>Li, Wei</creator><creator>Gao, Zhiyong</creator><creator>Gu, Dawu</creator><creator>Ge, Chenyu</creator><creator>Liao, Linfeng</creator><creator>Zhou, Zhihong</creator><creator>Liu, Ya</creator><creator>Liu, Zhiqiang</creator><general>한국인터넷정보학회</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20170130</creationdate><title>Security Analysis of the Whirlpool Hash Function in the Cloud of Things</title><author>Li, Wei ; Gao, Zhiyong ; Gu, Dawu ; Ge, Chenyu ; Liao, Linfeng ; Zhou, Zhihong ; Liu, Ya ; Liu, Zhiqiang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k506-13e9d08a8e503aceeb7b47e9838748cfd794895f995ce2feff171c7220e633933</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2017</creationdate><topic>Cloud of Things</topic><topic>Fault Analysis</topic><topic>Hash Function</topic><topic>Whirlpool</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Wei</creatorcontrib><creatorcontrib>Gao, Zhiyong</creatorcontrib><creatorcontrib>Gu, Dawu</creatorcontrib><creatorcontrib>Ge, Chenyu</creatorcontrib><creatorcontrib>Liao, Linfeng</creatorcontrib><creatorcontrib>Zhou, Zhihong</creatorcontrib><creatorcontrib>Liu, Ya</creatorcontrib><creatorcontrib>Liu, Zhiqiang</creatorcontrib><collection>Korean Studies Information Service System (KISS)</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Wei</au><au>Gao, Zhiyong</au><au>Gu, Dawu</au><au>Ge, Chenyu</au><au>Liao, Linfeng</au><au>Zhou, Zhihong</au><au>Liu, Ya</au><au>Liu, Zhiqiang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Analysis of the Whirlpool Hash Function in the Cloud of Things</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2017-01-30</date><risdate>2017</risdate><volume>11</volume><issue>1</issue><spage>536</spage><epage>551</epage><pages>536-551</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.</abstract><pub>한국인터넷정보학회</pub><tpages>16</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1976-7277
ispartof KSII transactions on Internet and information systems, 2017-01, Vol.11 (1), p.536-551
issn 1976-7277
1976-7277
language kor
recordid cdi_kisti_ndsl_JAKO201711656707186
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Cloud of Things
Fault Analysis
Hash Function
Whirlpool
title Security Analysis of the Whirlpool Hash Function in the Cloud of Things
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T09%3A27%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kiss_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Analysis%20of%20the%20Whirlpool%20Hash%20Function%20in%20the%20Cloud%20of%20Things&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Li,%20Wei&rft.date=2017-01-30&rft.volume=11&rft.issue=1&rft.spage=536&rft.epage=551&rft.pages=536-551&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/&rft_dat=%3Ckiss_kisti%3E3531777%3C/kiss_kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_kiss_id=3531777&rfr_iscdi=true