Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers

Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi

Research output: Contribution to journalArticle

Abstract

Normally, it has been believed that the initial values of cryptographic schemes do not need to be managed secretly unlike the secret keys. However, we show that multiple modes of operation of block ciphers can suffer a loss of security by the state of the initial values. We consider several attacks according to the environment of the initial values; known-IV attack, known-in-advance-IV attack, and replayed-and-known-IV attack. Our attacks on cascaded three-key triple modes of operation requires 3-7 blocks of plaintexts (or ciphertexts) and 3 • 256-9 • 256 encryptions. We also give the attacks on multiple modes proposed by Biham.

Original languageEnglish
Pages (from-to)441-462
Number of pages22
JournalJournal of Cryptology
Volume19
Issue number4
DOIs
Publication statusPublished - 2006 Oct

Keywords

  • Block ciphers
  • Cryptanalysis
  • Known-IV attacks
  • Knownin- advance-IV attacks
  • Multiple modes of operation
  • Replayed-and-known-IV attacks

ASJC Scopus subject areas

  • Software
  • Computer Science Applications
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers'. Together they form a unique fingerprint.

  • Cite this