Skip to main content

The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2020)

Abstract

In this paper a new type of application layer attack against complex IoT environments is presented which is based on unsafe typecasting and loose comparisons. We describe the concept of magic hashes and explain why they are relevant in IoT platforms from a security point of view. We focus our efforts on lightweight cryptographic hash functions which can be potential candidates for future IoT applications and embedded systems. We present the first known magic hashes for lightweight cryptographic hash function families PHOTON, QUARK and SPONGENT which were designed for constrained environments such as IoT devices. With this, we aim to create a reference point not only for further scientific research but also for practical testing of the above mentioned systems. We also run through calculations on the estimated amount of computation necessary to find hashes with the required characteristics and compare these estimates with empirical results. We conclude with an assessment on the feasibility of finding additional magic hashes with our current computational possibilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    PHOTON-128(47736359) = 0e736288061945637780053045686224.

References

  1. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)

    Article  Google Scholar 

  2. Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N., Urien, P.: Internet of Things: a definition & taxonomy. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp. 72–77. IEEE (2015)

    Google Scholar 

  3. Xu, Z., Li, X.: Secure transfer protocol between app and device of internet of things. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 25–34. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72395-2_3

    Chapter  Google Scholar 

  4. Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of IoT-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20(4), 3453–3495 (2018)

    Article  Google Scholar 

  5. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. IEEE Comput. 50(7), 80–84 (2017)

    Article  Google Scholar 

  6. Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015)

    Google Scholar 

  7. Nader, P., Honeine, P., Beauseroy, P.: Detection of cyberattacks in a water distribution system using machine learning techniques. In: Sixth International Conference on Digital Information Processing and Communications (ICDIPC), Beirut, pp. 25–30 (2016)

    Google Scholar 

  8. Tranchita, C., Hadjsaid, N., Torres, A.: Overview of the power systems security with regard to cyberattacks. In: 2009 Fourth International Conference on Critical Infrastructures, Linkoping, pp. 1–8 (2009)

    Google Scholar 

  9. Panasenko, S., Smagin, S.: Lightweight cryptography: underlying principles and approaches. Int. J. Comput. Theory Eng. 3(4), 516–520 (2011)

    Article  Google Scholar 

  10. Schneier, B.: Cryptographic design vulnerabilities. IEEE Comput. 31(9), 29–33 (1998)

    Article  Google Scholar 

  11. Garrin, E., Lee, S., Ayrapetyan, R., Shitov, A.: Ultra lightweight JavaScript engine for internet of things. In: SPLASH Companion: Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems. Software for Humanity, Programming, Languages and Applications (2015)

    Google Scholar 

  12. Pradel, M., Sen, K.: The good, the bad, and the ugly: an empirical study of implicit type conversions in JavaScript. In: 29th European Conference on Object-Oriented Programming (ECOOP 2015) (2015)

    Google Scholar 

  13. Eshkevari, L., Dos Santos, F., Cordy, J.R., Antoniol, G.: Are PHP applications ready for hack? In: 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER) (2015)

    Google Scholar 

  14. Kopf, G.: Non-obvious bugs by example. In: 9th CCONFidence Conference (2011)

    Google Scholar 

  15. Cleverly, M.A.: https://twitter.com/macleverly/status/597969666598801409, May 2015 Twitter announcement

  16. Tihanyi, N.: https://twitter.com/TihanyiNorbert/status/1138075224010833921, June 2019 Twitter announcement

  17. Tihanyi, N.: https://twitter.com/TihanyiNorbert/status/1148586399207178241, July 2019 Twitter announcement

  18. Mckay, K., Bassham, L., Turan, M., Mouha, N.: Report on Lightweight Cryptography NISTIR 8114 (2017)

    Google Scholar 

  19. Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222–239. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_13

    Chapter  Google Scholar 

  20. Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2012). https://doi.org/10.1007/s00145-012-9125-6

    Article  MathSciNet  MATH  Google Scholar 

  21. Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_21

    Chapter  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Axel Poschmann for his insightful comments. We would also like to thank Eötvös Loránd University for the opportunity to use the ATLAS Super Cluster.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Norbert Tihanyi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tihanyi, N., Borsos, B. (2021). The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68884-4_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68883-7

  • Online ISBN: 978-3-030-68884-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics