TY - JOUR
T1 - Padding oracle attacks on multiple modes of operation
AU - Lee, Taekeon
AU - Kim, Jongsung
AU - Lee, Changhoon
AU - Sung, Jaechul
AU - Lee, Sangjin
AU - Hong, Dowon
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2005
Y1 - 2005
N2 - In [12] Vaudenay presented side-channel attacks on the CBC encryption mode cipher under the padding oracle attack models, which enable an adversary to determine the correct message with knowledge of ciphertext. Black and Urtubia generalized these attacks in several directions, considering various padding schemes [4]. In this paper we extend these attacks to other kinds of modes of operation for block ciphers. Specifically, we apply the padding oracle attacks to multiple modes of operation with various padding schemes. As a results of this paper, 12 out of total 36 double modes and 22 out of total 216 triple modes are vulnerable to the padding oracle attacks. It means that the 12 double modes and the 22 triple modes exposed to these types of attacks do not offer the better security than single modes.
AB - In [12] Vaudenay presented side-channel attacks on the CBC encryption mode cipher under the padding oracle attack models, which enable an adversary to determine the correct message with knowledge of ciphertext. Black and Urtubia generalized these attacks in several directions, considering various padding schemes [4]. In this paper we extend these attacks to other kinds of modes of operation for block ciphers. Specifically, we apply the padding oracle attacks to multiple modes of operation with various padding schemes. As a results of this paper, 12 out of total 36 double modes and 22 out of total 216 triple modes are vulnerable to the padding oracle attacks. It means that the 12 double modes and the 22 triple modes exposed to these types of attacks do not offer the better security than single modes.
KW - Block ciphers
KW - Multiple modes of operation
KW - Padding oracle attacks
UR - http://www.scopus.com/inward/record.url?scp=24944476480&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=24944476480&partnerID=8YFLogxK
U2 - 10.1007/11496618_25
DO - 10.1007/11496618_25
M3 - Conference article
AN - SCOPUS:24944476480
SN - 0302-9743
VL - 3506
SP - 343
EP - 351
JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
T2 - 7th International Conference on Information Security and Cryptology - ICISC 2004
Y2 - 2 December 2004 through 3 December 2004
ER -