Blockwise-adaptive chosen-plaintext attack and online modes of encryption

被引:0
|
作者
Bard, Gregory V. [1 ]
机构
[1] Fordham Univ, Dept Math, Bronx, NY 10458 USA
来源
关键词
modes of encryption; blockwise-adaptive chosen-plaintext attack; BACPA; MACPA; online-ness; ECB; CBC; CTR; OFB; CFB; IGE; ABCHCBC; HPCBC; XCBC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Here, we present a generalized notion of online modes of encryption that make one call to a pseudorandom permutation per block of plaintext. This generalization, called "Canonical Form," not only allows for modes of encryption to be written in a common format, but provides for easy proofs of blockwise-adaptive chosen-plaintext (BACPA) security/insecurity. We also develop necessary and sufficient conditions for security of a mode of encryption in Canonical Form. As an application, we write ten modes of encryption in Canonical Form, and we prove the security status (under BACPA) of nine of them. While most of these modes already had proven BACPA security status in previously published papers, it is hoped the more general method specified here will be of use in writing simpler proofs for other modes, including modes of encryption yet to be developed. BACPA is a model for adversaries slightly more powerful than those in traditional chosen-plaintext attack. In particular, instead of forcing the target to encrypt messages of his/her own choosing, the attacker can insert blocks of his/her own choosing into the target's messages [JMV02]. Some modes of encryption which are secure against traditional CPA, for example the ubiquitous Cipher Block Chaining (CBC), are insecure against BACPA. Several papers have been written to explore BACPA and modes of encryption under it.
引用
收藏
页码:129 / 151
页数:23
相关论文
共 50 条
  • [31] A novel data dependent multimedia encryption algorithm secure against chosen-plaintext attacks
    Koh, Min-Sung
    Rodriguez-Marek, Esteban
    Talarico, Claudio
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1527 - 1530
  • [32] Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain
    Peng, Xiang
    Wei, Hengzheng
    Zhang, Peng
    OPTICS LETTERS, 2006, 31 (22) : 3261 - 3263
  • [33] Vulnerability of impulse attack-free four random phase mask cryptosystems to chosen-plaintext attack
    Li, Tuo
    Shi, Yishi
    JOURNAL OF OPTICS, 2016, 18 (03)
  • [34] Chosen-plaintext Attack on Double-random-phase-encoding-based Image Hiding Method
    Xu, Hongsheng
    Li, Guirong
    Zhu, Xianchen
    MIPPR 2015: REMOTE SENSING IMAGE PROCESSING, GEOGRAPHIC INFORMATION SYSTEMS, AND OTHER APPLICATIONS, 2015, 9815
  • [35] Physical Layer Encryption Algorithm for Chaotic Optical OFDM Transmission against Chosen-Plaintext Attacks
    Yang, Xuelin
    Shen, Zanwei
    Hu, Xiaonan
    Hu, Weisheng
    2016 18TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2016,
  • [36] Bit-policy based chosen-plaintext collision attack on reused-mask AES?
    Zhang, Meiling
    Wang, Liusheng
    Zhao, Bingyu
    Zheng, Dong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [37] Chosen plaintext attack on an adaptive arithmetic coding compression algorithm
    Bergen, Helen A.
    Hogan, James M.
    Computers and Security, 1993, 12 (02): : 157 - 167
  • [38] Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis
    Li, Yanbin
    Huang, Yuxin
    Guo, Yikang
    Ge, Chunpeng
    Kong, Fanyu
    Ren, Yongjun
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (01): : 174 - 185
  • [39] Reinforcing Protection against Chosen-plaintext Attack using Ciphertext Fragmentation in Multi-cloud Environments
    Kapusta, Katarzyna
    Qiu, Han
    Memmi, Gerard
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 7 - 9
  • [40] Protecting cipher block chaining against adaptive chosen plaintext attack
    Loe, Chuan-Wen
    Khoo, Khoongming
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 135 - +