New efficient padding methods secure against padding oracle attacks

HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the padding during decryption. Of the ten existing padding methods, only two (ABYT-PAD and ABIT-PAD) can withstand padding oracle attacks. However, these methods are not efficient since they either use a random number generator or require MAC verification in applications. The three new padding methods proposed in this paper are secure against padding oracle attacks and more efficient compared to the two aforementioned padding methods.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages329-342
Number of pages14
Volume9558
ISBN (Print)9783319308395
DOIs
Publication statusPublished - 2016
Event18th International Conference on Information Security and Cryptology, ICISC 2015 - Seoul, Korea, Republic of
Duration: 2015 Nov 252015 Nov 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9558
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other18th International Conference on Information Security and Cryptology, ICISC 2015
CountryKorea, Republic of
CitySeoul
Period15/11/2515/11/27

Keywords

  • CBC mode of operation
  • Padding methods
  • Padding oracle attack

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'New efficient padding methods secure against padding oracle attacks'. Together they form a unique fingerprint.

  • Cite this

    Kang, H., Park, M., Moon, D., Lee, C., Kim, J., Kim, K., Kim, J., & Hong, S. (2016). New efficient padding methods secure against padding oracle attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9558, pp. 329-342). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9558). Springer Verlag. https://doi.org/10.1007/978-3-319-30840-1_21