Practical Cryptanalysis of the Open Smart Grid Protocol View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2015-08-12

AUTHORS

Philipp Jovanovic , Samuel Neves

ABSTRACT

This paper analyses the cryptography used in the Open Smart Grid Protocol (OSGP). The authenticated encryption (AE) scheme deployed by OSGP is a non-standard composition of RC4 and a home-brewed MAC, the “OMA digest”.We present several practical key-recovery attacks against the OMA digest. The first and basic variant can achieve this with a mere 13 queries to an OMA digest oracle and negligible time complexity. A more sophisticated version breaks the OMA digest with only 4 queries and a time complexity of about 225\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{25}$$\end{document} simple operations. A different approach only requires one arbitrary valid plaintext-tag pair, and recovers the key in an average of 144 message verification queries, or one ciphertext-tag pair and 168 ciphertext verification queries.Since the encryption key is derived from the key used by the OMA digest, our attacks break both confidentiality and authenticity of OSGP. More... »

PAGES

297-316

Book

TITLE

Fast Software Encryption

ISBN

978-3-662-48115-8
978-3-662-48116-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-48116-5_15

DOI

http://dx.doi.org/10.1007/978-3-662-48116-5_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1037383368


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Passau, Passau, Germany", 
          "id": "http://www.grid.ac/institutes/grid.11046.32", 
          "name": [
            "University of Passau, Passau, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jovanovic", 
        "givenName": "Philipp", 
        "id": "sg:person.016300712435.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016300712435.04"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Coimbra, Coimbra, Portugal", 
          "id": "http://www.grid.ac/institutes/grid.8051.c", 
          "name": [
            "University of Coimbra, Coimbra, Portugal"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Neves", 
        "givenName": "Samuel", 
        "id": "sg:person.011136377232.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2015-08-12", 
    "datePublishedReg": "2015-08-12", 
    "description": "This paper analyses the cryptography used in the Open Smart Grid Protocol (OSGP). The authenticated encryption (AE) scheme deployed by OSGP is a non-standard composition of RC4 and a home-brewed MAC, the \u201cOMA digest\u201d.We present several practical key-recovery attacks against the OMA digest. The first and basic variant can achieve this with a mere 13 queries to an OMA digest oracle and negligible time complexity. A more sophisticated version breaks the OMA digest with only 4 queries and a time complexity of about 225\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{25}$$\\end{document} simple operations. A different approach only requires one arbitrary valid plaintext-tag pair, and recovers the key in an average of 144 message verification queries, or one ciphertext-tag pair and 168 ciphertext verification queries.Since the encryption key is derived from the key used by the OMA digest, our attacks break both confidentiality and authenticity of OSGP.", 
    "editor": [
      {
        "familyName": "Leander", 
        "givenName": "Gregor", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-48116-5_15", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-662-48115-8", 
        "978-3-662-48116-5"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "Open Smart Grid Protocol", 
      "Smart Grid Protocol", 
      "verification queries", 
      "grid protocol", 
      "time complexity", 
      "practical key-recovery attacks", 
      "encryption key", 
      "encryption scheme", 
      "key recovery attack", 
      "queries", 
      "Practical Cryptanalysis", 
      "non-standard composition", 
      "attacks", 
      "basic variants", 
      "complexity", 
      "key", 
      "simple operation", 
      "cryptography", 
      "different approaches", 
      "confidentiality", 
      "oracle", 
      "cryptanalysis", 
      "RC4", 
      "sophisticated version", 
      "protocol", 
      "MAC", 
      "scheme", 
      "authenticity", 
      "operation", 
      "version", 
      "pairs", 
      "variants", 
      "digests", 
      "average", 
      "composition", 
      "paper", 
      "approach"
    ], 
    "name": "Practical Cryptanalysis of the Open Smart Grid Protocol", 
    "pagination": "297-316", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1037383368"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-48116-5_15"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-48116-5_15", 
      "https://app.dimensions.ai/details/publication/pub.1037383368"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:55", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_27.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-48116-5_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48116-5_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48116-5_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48116-5_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-48116-5_15'


 

This table displays all metadata directly associated to this object as RDF triples.

106 TRIPLES      22 PREDICATES      61 URIs      54 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-48116-5_15 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N27fa380872be4eb69f7f11369bfaf104
4 schema:datePublished 2015-08-12
5 schema:datePublishedReg 2015-08-12
6 schema:description This paper analyses the cryptography used in the Open Smart Grid Protocol (OSGP). The authenticated encryption (AE) scheme deployed by OSGP is a non-standard composition of RC4 and a home-brewed MAC, the “OMA digest”.We present several practical key-recovery attacks against the OMA digest. The first and basic variant can achieve this with a mere 13 queries to an OMA digest oracle and negligible time complexity. A more sophisticated version breaks the OMA digest with only 4 queries and a time complexity of about 225\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{25}$$\end{document} simple operations. A different approach only requires one arbitrary valid plaintext-tag pair, and recovers the key in an average of 144 message verification queries, or one ciphertext-tag pair and 168 ciphertext verification queries.Since the encryption key is derived from the key used by the OMA digest, our attacks break both confidentiality and authenticity of OSGP.
7 schema:editor N82ca559a1c6a4b6c8372bf7a317621f5
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N0e964873c0e24b1b8d97d66626b91cdd
11 schema:keywords MAC
12 Open Smart Grid Protocol
13 Practical Cryptanalysis
14 RC4
15 Smart Grid Protocol
16 approach
17 attacks
18 authenticity
19 average
20 basic variants
21 complexity
22 composition
23 confidentiality
24 cryptanalysis
25 cryptography
26 different approaches
27 digests
28 encryption key
29 encryption scheme
30 grid protocol
31 key
32 key recovery attack
33 non-standard composition
34 operation
35 oracle
36 pairs
37 paper
38 practical key-recovery attacks
39 protocol
40 queries
41 scheme
42 simple operation
43 sophisticated version
44 time complexity
45 variants
46 verification queries
47 version
48 schema:name Practical Cryptanalysis of the Open Smart Grid Protocol
49 schema:pagination 297-316
50 schema:productId N35be922fce4846adbea9fc8cc32442c2
51 Nb2bc31932666422ea349d6b347222675
52 schema:publisher N9883d63aa9a5454283b4bbd37dfe2e6a
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037383368
54 https://doi.org/10.1007/978-3-662-48116-5_15
55 schema:sdDatePublished 2022-10-01T06:55
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher N1bb6297d94b7462bb6ac9ecb450484c9
58 schema:url https://doi.org/10.1007/978-3-662-48116-5_15
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N0e964873c0e24b1b8d97d66626b91cdd schema:isbn 978-3-662-48115-8
63 978-3-662-48116-5
64 schema:name Fast Software Encryption
65 rdf:type schema:Book
66 N1bb6297d94b7462bb6ac9ecb450484c9 schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 N27fa380872be4eb69f7f11369bfaf104 rdf:first sg:person.016300712435.04
69 rdf:rest N67a4184e62fe4196af836bba47146dce
70 N35be922fce4846adbea9fc8cc32442c2 schema:name doi
71 schema:value 10.1007/978-3-662-48116-5_15
72 rdf:type schema:PropertyValue
73 N67a4184e62fe4196af836bba47146dce rdf:first sg:person.011136377232.42
74 rdf:rest rdf:nil
75 N82ca559a1c6a4b6c8372bf7a317621f5 rdf:first N8f4c64652f39403b91e874ccfe9f61d5
76 rdf:rest rdf:nil
77 N8f4c64652f39403b91e874ccfe9f61d5 schema:familyName Leander
78 schema:givenName Gregor
79 rdf:type schema:Person
80 N9883d63aa9a5454283b4bbd37dfe2e6a schema:name Springer Nature
81 rdf:type schema:Organisation
82 Nb2bc31932666422ea349d6b347222675 schema:name dimensions_id
83 schema:value pub.1037383368
84 rdf:type schema:PropertyValue
85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
86 schema:name Information and Computing Sciences
87 rdf:type schema:DefinedTerm
88 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
89 schema:name Artificial Intelligence and Image Processing
90 rdf:type schema:DefinedTerm
91 sg:person.011136377232.42 schema:affiliation grid-institutes:grid.8051.c
92 schema:familyName Neves
93 schema:givenName Samuel
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42
95 rdf:type schema:Person
96 sg:person.016300712435.04 schema:affiliation grid-institutes:grid.11046.32
97 schema:familyName Jovanovic
98 schema:givenName Philipp
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016300712435.04
100 rdf:type schema:Person
101 grid-institutes:grid.11046.32 schema:alternateName University of Passau, Passau, Germany
102 schema:name University of Passau, Passau, Germany
103 rdf:type schema:Organization
104 grid-institutes:grid.8051.c schema:alternateName University of Coimbra, Coimbra, Portugal
105 schema:name University of Coimbra, Coimbra, Portugal
106 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...