Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages103-113
Number of pages11
Volume2288
ISBN (Print)3540433198, 9783540433194
Publication statusPublished - 2002
Event4th International Conference on Information Security and Cryptology, ICISC 2001 - Seoul, Korea, Republic of
Duration: 2001 Dec 62001 Dec 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2288
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on Information Security and Cryptology, ICISC 2001
CountryKorea, Republic of
CitySeoul
Period01/12/601/12/7

Fingerprint

Modes of Operation
Security Analysis
Concretes
Cryptography
Encryption
Attack

Keywords

  • Concrete Security
  • Modes of Operation
  • Pseudorandom Function Family
  • Symmetric Encryption Schemes

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Sung, J., Lee, S., Lim, J. I., Lee, W., & Yi, O. (2002). Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2288, pp. 103-113). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2288). Springer Verlag.

Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. / Sung, Jaechul; Lee, Sangjin; Lim, Jong In; Lee, Wonil; Yi, Okyeon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2288 Springer Verlag, 2002. p. 103-113 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sung, J, Lee, S, Lim, JI, Lee, W & Yi, O 2002, Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 2288, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2288, Springer Verlag, pp. 103-113, 4th International Conference on Information Security and Cryptology, ICISC 2001, Seoul, Korea, Republic of, 01/12/6.
Sung J, Lee S, Lim JI, Lee W, Yi O. Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2288. Springer Verlag. 2002. p. 103-113. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Sung, Jaechul ; Lee, Sangjin ; Lim, Jong In ; Lee, Wonil ; Yi, Okyeon. / Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2288 Springer Verlag, 2002. pp. 103-113 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{d96bd7b2cafd4908b76e6aa944206a52,
title = "Concrete security analysis of CTR-OFB and CTR-CFB modes of operation",
abstract = "In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.",
keywords = "Concrete Security, Modes of Operation, Pseudorandom Function Family, Symmetric Encryption Schemes",
author = "Jaechul Sung and Sangjin Lee and Lim, {Jong In} and Wonil Lee and Okyeon Yi",
year = "2002",
language = "English",
isbn = "3540433198",
volume = "2288",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "103--113",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

AU - Sung, Jaechul

AU - Lee, Sangjin

AU - Lim, Jong In

AU - Lee, Wonil

AU - Yi, Okyeon

PY - 2002

Y1 - 2002

N2 - In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.

AB - In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.

KW - Concrete Security

KW - Modes of Operation

KW - Pseudorandom Function Family

KW - Symmetric Encryption Schemes

UR - http://www.scopus.com/inward/record.url?scp=24944503795&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944503795&partnerID=8YFLogxK

M3 - Conference contribution

SN - 3540433198

SN - 9783540433194

VL - 2288

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 103

EP - 113

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -