Blockwise-adaptive chosen-plaintext attack and online modes of encryption

被引:0
|
作者
Bard, Gregory V. [1 ]
机构
[1] Fordham Univ, Dept Math, Bronx, NY 10458 USA
来源
关键词
modes of encryption; blockwise-adaptive chosen-plaintext attack; BACPA; MACPA; online-ness; ECB; CBC; CTR; OFB; CFB; IGE; ABCHCBC; HPCBC; XCBC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Here, we present a generalized notion of online modes of encryption that make one call to a pseudorandom permutation per block of plaintext. This generalization, called "Canonical Form," not only allows for modes of encryption to be written in a common format, but provides for easy proofs of blockwise-adaptive chosen-plaintext (BACPA) security/insecurity. We also develop necessary and sufficient conditions for security of a mode of encryption in Canonical Form. As an application, we write ten modes of encryption in Canonical Form, and we prove the security status (under BACPA) of nine of them. While most of these modes already had proven BACPA security status in previously published papers, it is hoped the more general method specified here will be of use in writing simpler proofs for other modes, including modes of encryption yet to be developed. BACPA is a model for adversaries slightly more powerful than those in traditional chosen-plaintext attack. In particular, instead of forcing the target to encrypt messages of his/her own choosing, the attacker can insert blocks of his/her own choosing into the target's messages [JMV02]. Some modes of encryption which are secure against traditional CPA, for example the ubiquitous Cipher Block Chaining (CBC), are insecure against BACPA. Several papers have been written to explore BACPA and modes of encryption under it.
引用
收藏
页码:129 / 151
页数:23
相关论文
共 50 条
  • [1] A challenging but. feasible blockwise-adaptive chosen-plaintext attack on SSL
    Bard, Gregory V.
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 99 - 109
  • [2] Chosen-plaintext attack on the double random polarization encryption
    Wang, Lei
    Wu, Quanying
    Situ, Guohai
    OPTICS EXPRESS, 2019, 27 (22): : 32158 - 32167
  • [3] Chosen-plaintext attack on double phase encoding encryption technique
    Wei, Hengzheng
    Peng, Xiang
    Zhang, Peng
    Liu, Haitao
    Feng, Songlin
    Guangxue Xuebao/Acta Optica Sinica, 2007, 27 (05): : 824 - 829
  • [4] On the security of gyrator transform-based image encryption by chosen-plaintext attack
    Sang, Jun
    Alam, Mohammad. S.
    Cai, Bin
    OPTICAL PATTERN RECOGNITION XXVII, 2016, 9845
  • [5] A chosen-plaintext attack on quantum permutation pad
    Piotr Zawadzki
    Quantum Information Processing, 23
  • [6] Chosen-plaintext attack on a chaotic image cipher
    Liu, Ting
    Min, Lequan
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 546 - 549
  • [7] Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
    Ding, Yaoling
    Shi, Ying
    Wang, An
    Zheng, Xuexin
    Wang, Zongyue
    Zhang, Guoshuang
    IEEE ACCESS, 2019, 7 : 63217 - 63229
  • [9] Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry
    Qin, Wan
    Peng, Xiang
    Meng, Xiangfeng
    Gao, Bruce Z.
    OPTICAL ENGINEERING, 2011, 50 (06)
  • [10] Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure
    Yuansheng Liu
    Leo Yu Zhang
    Jia Wang
    Yushu Zhang
    Kwok-wo Wong
    Nonlinear Dynamics, 2016, 84 : 2241 - 2250