Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation
نویسنده
چکیده
In a paper cryptanalyzing many triple modes of operation, Biham proposed four new triple modes and five new quadruple modes of operation for DES. It was conjectured that the complexity (in a particular threat model) of breaking the triple modes is at least 2 and that the quadruple modes are more secure than any triple mode. We present new attacks on all but one of the proposed modes. We can break all but two of Biham’s proposed modes with at most 2 off-line trial encryptions and between 2 and 2 (depending upon the mode) chosen-IV chosen texts; another mode can be broken with somewhat more work. This raises questions about the suitability of the proposed modes, and provides further evidence for the fragility of inner chaining; however, we emphasize that our results do not disprove Biham’s conjectures, as we rely on an extended attack model which admits more powerful adversaries who can mount chosen-IV queries, a capability denied to them in Biham’s model.
منابع مشابه
High speed cryptography for network and disk encryption applications
In this thesis, new ideas in cryptography, cryptanalysis and designing high speed secure applications are presented. The Advanced Encryption Standard (AES) is used to demonstrate these ideas. In the eld of cryptography, new encryption models are proposed. In the eld of cryptanalysis, a secure key schedule for AES is presented together with new generalized attacks. These generalized attacks are ...
متن کاملA Survey of Asynchronous Extensions of Block Cipher Modes of Operation
While modes of operation and asynchronously clocked devices have been studied separately, the combination of the two ideas has received little attention. We first consider an asynchronously clocked mode of operation based on an extension of OFB mode [2]. After reviewing some of the weaknesses of our proposed mode of operation, we extend on our original design in an attempt to mask some of the i...
متن کاملThe Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation
This paper studies the theoretic background of cryptographic modes of operation, in particular those modes proposed to ensure message privacy. A novel algebraic model is presented as an archetype of encryption design. In the ideal case, encrypting multiple messages is treated as inductively applying the algebraic operation F, an operation corresponding to block-by-block processing, on Latin Squ...
متن کاملCryptanalysis of the EPBC Authenticated Encryption Mode
A large variety of methods for using block ciphers, so called ‘modes of operation’, have been proposed, including some designed to provide both confidentiality and integrity protection. Such modes, usually known as ‘authenticated encryption’ modes, are increasingly important given the variety of issues now known with the use of unauthenticated encryption. In this paper we show that a mode known...
متن کاملCombination of Beamforming and Synchronization Methods for Epileptic Source Localization, using Simulated EEG Signals
Localization of sources in patients with focal seizure has recently attracted many attentions. In the severe cases of focal seizure, there is a possibility of doing neurosurgery operation to remove the defected tissue. The prosperity of this heavy operation completely depends on the accuracy of source localization. To increase this accuracy, this paper presents a new weighted beamforming method...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998