Protecting cipher block chaining against adaptive chosen plaintext attack

被引:0
|
作者
Loe, Chuan-Wen [1 ]
Khoo, Khoongming [1 ]
机构
[1] DSO Natl Labs, 20 Sci Pk Dr, Singapore 118230, Singapore
来源
SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2006年
关键词
cipher block chaining; adaptive chosen plaintext attack; input-output masked CBC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the literature, several encryption modes of operation based on cipher block chaining (CBC) has been proven to be secure under non-adaptive chosen plaintext attack (CPA-1) in the left-or-right (LOR) or find-then-guess (FTG) security models. However, it was shown by Joux et. al. at Crypto 2002 that if we allow the adversary to perform an adaptive chosen plaintext attack (CPA-2), then CBC, ABC and GEM are susceptible to FTG attacks. In this paper, we propose a new CBC-type encryption called input-output masked CBC (IO-CBC) which can protect against FTG and LOR attacks based on forcing an input collision, protects against Joux's FTG attack under proper implementation, and increases the difficulty of linear and differential cryptanalysis. The efficiency of IO-CBC is comparable to CBC because it does only one additonal encryption when compared with CBC. We also reasoned that the security proof of an IO-CBC variant follows from that of OCB.
引用
收藏
页码:135 / +
页数:2
相关论文
共 50 条
  • [21] Error Correction of Noisy Block Cipher using Cipher and Plaintext Characteristics
    Mirza, Nabil M. K.
    Osman, Ziad
    Zantout, Rached
    El-Sayed, Mohamed
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 151 - +
  • [22] A chosen-plaintext attack on quantum permutation pad
    Piotr Zawadzki
    Quantum Information Processing, 23
  • [24] Chosen ciphertext attack on a chaotic stream cipher
    Lin, Zhuosheng
    Yu, Simin
    Lu, Jinhu
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 5390 - 5394
  • [25] Performance of Interleaved Cipher Block Chaining in CCMP
    Codabux-Rossan, Zadia
    Doomun, M. Razvi
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 53 - 58
  • [26] Pseudorandom analysis of cipher block chaining model
    Qu, Haibin
    Zhou, Jinfang
    Zhejiang Daxue Xuebao (Ziran Kexue Ban)/Journal of Zhejiang University (Natural Science Edition), 2000, 34 (06): : 670 - 672
  • [27] Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack
    Yushu Zhang
    Di Xiao
    Nonlinear Dynamics, 2013, 72 : 751 - 756
  • [28] A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
    Camenisch, Jan
    Chandran, Nishanth
    Shoup, Victor
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 351 - +
  • [29] Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack
    Zhang, Yushu
    Xiao, Di
    NONLINEAR DYNAMICS, 2013, 72 (04) : 751 - 756
  • [30] Chosen-plaintext attack on the double random polarization encryption
    Wang, Lei
    Wu, Quanying
    Situ, Guohai
    OPTICS EXPRESS, 2019, 27 (22): : 32158 - 32167