Known-IV attacks on triple modes of operation of block ciphers

Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jong In Lim, Okyeon Yi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham’s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages208-221
Number of pages14
Volume2248
ISBN (Print)3540429875, 9783540429876
Publication statusPublished - 2001
Event7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 - Gold Coast, Australia
Duration: 2001 Dec 92001 Dec 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2248
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001
CountryAustralia
CityGold Coast
Period01/12/901/12/13

Fingerprint

Block Ciphers
Modes of Operation
Attack
Cascade
Decrease
Text

Keywords

  • Block cipher
  • Mode of operation for DES
  • Triple DES

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. I., & Yi, O. (2001). Known-IV attacks on triple modes of operation of block ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2248, pp. 208-221). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2248). Springer Verlag.

Known-IV attacks on triple modes of operation of block ciphers. / Hong, Deukjo; Sung, Jaechul; Hong, Seokhie; Lee, Wonil; Lee, Sangjin; Lim, Jong In; Yi, Okyeon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2248 Springer Verlag, 2001. p. 208-221 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2248).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hong, D, Sung, J, Hong, S, Lee, W, Lee, S, Lim, JI & Yi, O 2001, Known-IV attacks on triple modes of operation of block ciphers. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 2248, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2248, Springer Verlag, pp. 208-221, 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, Gold Coast, Australia, 01/12/9.
Hong D, Sung J, Hong S, Lee W, Lee S, Lim JI et al. Known-IV attacks on triple modes of operation of block ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2248. Springer Verlag. 2001. p. 208-221. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Hong, Deukjo ; Sung, Jaechul ; Hong, Seokhie ; Lee, Wonil ; Lee, Sangjin ; Lim, Jong In ; Yi, Okyeon. / Known-IV attacks on triple modes of operation of block ciphers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2248 Springer Verlag, 2001. pp. 208-221 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{7a87dcd317e1419ab5173d225a9139ff,
title = "Known-IV attacks on triple modes of operation of block ciphers",
abstract = "With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham’s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.",
keywords = "Block cipher, Mode of operation for DES, Triple DES",
author = "Deukjo Hong and Jaechul Sung and Seokhie Hong and Wonil Lee and Sangjin Lee and Lim, {Jong In} and Okyeon Yi",
year = "2001",
language = "English",
isbn = "3540429875",
volume = "2248",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "208--221",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Known-IV attacks on triple modes of operation of block ciphers

AU - Hong, Deukjo

AU - Sung, Jaechul

AU - Hong, Seokhie

AU - Lee, Wonil

AU - Lee, Sangjin

AU - Lim, Jong In

AU - Yi, Okyeon

PY - 2001

Y1 - 2001

N2 - With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham’s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.

AB - With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham’s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.

KW - Block cipher

KW - Mode of operation for DES

KW - Triple DES

UR - http://www.scopus.com/inward/record.url?scp=84946827458&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84946827458&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84946827458

SN - 3540429875

SN - 9783540429876

VL - 2248

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 208

EP - 221

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -