[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Related-Mode Attacks on Block Cipher Modes of Operation

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3482))

Included in the following conference series:

Abstract

In this paper, we present a generalization of the notion of the recently proposed related-cipher attacks. In particular, we show that when the cryptanalyst has access to an oracle under one mode, then almost all other related-cipher modes can be attacked with ease. Typically only one chosen plaintext/ciphertext query is required, while computational complexity is negligible.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–259. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Daemen, J., Knudsen, L.R., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 13–27. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  3. Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J., Yi, O.: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 208–221. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Joux, A.: Cryptanalysis of the EMD Mode of Operation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 1–16. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. National Institute of Standards and Technology, “Specification for the Advanced Encryption Standard (AES)” FIPS 197. [Online] Available at, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  6. National Institute of Standards and Technology, “DES Modes of Operation” FIPS 81 (1980)

    Google Scholar 

  7. National Institute of Standards and Technology, “Recommendation for Block Cipher Modes of Operation − Methods and Techniques” SP 800-38A (2001)

    Google Scholar 

  8. Netscape, “Secure Sockets Layer (SSL)”, [Online] Available at, http://wp.netscape.com/security/techbriefs/ssl.html

  9. Paterson, K.G., Yau, A.: Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 305–323. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Rogaway, P.: The EMD Mode of Operation (a Tweaked, Wide-blocksize, Strong PRP)., Cryptology ePrint archive (2002), http://eprint.iacr.org/2002/148/

  11. Vaudenay, S.: Security Flaws Induced by CBC Padding − Applications to SSL, IPSEC, WTLS .... In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 534–545. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Wagner, D.: Cryptanalysis of Some Recently-proposed Multiple Modes of Operation. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 254–269. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Wu, H.: Related-Cipher Attacks. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 447–455. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Zimmerman, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Phan, R.C.–., Siddiqi, M.U. (2005). Related-Mode Attacks on Block Cipher Modes of Operation. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_73

Download citation

  • DOI: https://doi.org/10.1007/11424857_73

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25862-9

  • Online ISBN: 978-3-540-32045-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics