Abstract
In this paper, we present a generalization of the notion of the recently proposed related-cipher attacks. In particular, we show that when the cryptanalyst has access to an oracle under one mode, then almost all other related-cipher modes can be attacked with ease. Typically only one chosen plaintext/ciphertext query is required, while computational complexity is negligible.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–259. Springer, Heidelberg (1999)
Daemen, J., Knudsen, L.R., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 13–27. Springer, Heidelberg (1997)
Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J., Yi, O.: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 208–221. Springer, Heidelberg (2001)
Joux, A.: Cryptanalysis of the EMD Mode of Operation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 1–16. Springer, Heidelberg (2003)
National Institute of Standards and Technology, “Specification for the Advanced Encryption Standard (AES)” FIPS 197. [Online] Available at, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
National Institute of Standards and Technology, “DES Modes of Operation” FIPS 81 (1980)
National Institute of Standards and Technology, “Recommendation for Block Cipher Modes of Operation − Methods and Techniques” SP 800-38A (2001)
Netscape, “Secure Sockets Layer (SSL)”, [Online] Available at, http://wp.netscape.com/security/techbriefs/ssl.html
Paterson, K.G., Yau, A.: Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 305–323. Springer, Heidelberg (2004)
Rogaway, P.: The EMD Mode of Operation (a Tweaked, Wide-blocksize, Strong PRP)., Cryptology ePrint archive (2002), http://eprint.iacr.org/2002/148/
Vaudenay, S.: Security Flaws Induced by CBC Padding − Applications to SSL, IPSEC, WTLS .... In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534–545. Springer, Heidelberg (2002)
Wagner, D.: Cryptanalysis of Some Recently-proposed Multiple Modes of Operation. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 254–269. Springer, Heidelberg (1998)
Wu, H.: Related-Cipher Attacks. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 447–455. Springer, Heidelberg (2002)
Zimmerman, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Phan, R.C.–., Siddiqi, M.U. (2005). Related-Mode Attacks on Block Cipher Modes of Operation. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_73
Download citation
DOI: https://doi.org/10.1007/11424857_73
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25862-9
Online ISBN: 978-3-540-32045-6
eBook Packages: Computer ScienceComputer Science (R0)