PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACK

Chuan-Wen Loe, Khoongming Khoo

Abstract

In the literature, several encryption modes of operation based on cipher block chaining (CBC) has been proven to be secure under non-adaptive chosen plaintext attack (CPA-1) in the left-or-right (LOR) or find-then-guess (FTG) security models. However, it was shown by Joux et. al. at Crypto 2002 that if we allow the adversary to perform an adaptive chosen plaintext attack (CPA-2), then CBC, ABC and GEM are susceptible to FTG attacks. In this paper, we propose a new CBC-type encryption called input-output masked CBC (IO-CBC) which can protect against FTG and LOR attacks based on forcing an input collision, protects against Joux’s FTG attack under proper implementation, and increases the difficulty of linear and differential cryptanalysis. The efficiency of IO-CBC is comparable to CBC because it does only one additonal encryption when compared with CBC. We also reasoned that the security proof of an IO-CBC variant follows from that of OCB.

References

  1. Alkassar, A., Geraldy, A., Pfitzmann, B. and Sadeghi, A. R. (2001). Optimized Self-Synchronizing Mode of Operation. LNCS 2335, Fast Software Encryption 2001. Springer-Verlag.
  2. Bellare, M., Desai, A., Jokipii, E. and Rogaway, P. (1997). A Concrete Security Treatment of Symmetric Encryption. Proceedings of Foundations of Computer Science'97. IEEE Press, 1997.
  3. Biham, E. and Shamir, A. Differential Cryptanalysis of the Full 16-Round DES. LNCS 740, Crypto 7892, Springer-Verlag, 1993.
  4. Daemon, J. and Rijmen, V. The Design of Rijndael: AES - The Advanced Encryption Standard, Springer, 2002.
  5. Golomb, S.W. Shift Register Sequences, Revised Edition, Agean Park Press, 1982.
  6. Joux, A., Martinet, G. and Valette, F. Blockwise Adaptive Attackers: Revisiting the (In)Security in some Provably Secure Encryption Modes: CBC, GEM, IACBC. LNCS 2442, Crypto 2002, pp. 17-30, Springer-Verlag, 2002.
  7. Jutla, C. Encryption Modes with Almost Free Message Integrity. LNCS 2045, Eurocrypt 2001, pp. 529-544, Springer-Verlag, 2001.
  8. Knudsen, L. Block Chaining Modes of Operation. Technical Report, Department of Informatics, University of Bergen, 2000.
  9. Matsui, M. The First Experimental Cryptanalysis of the Data Encryption Standard. LNCS 839, Crypto 7894, pp. 1-11, Springer-Verlag, 1994.
  10. Matyas, M. and Matyas, S. Cryptography: A New Dimension in Computer Data Security, John Wiley and Sons, New York, 1982.
  11. Preneel, B., Nuttin, M., Rijmen, V. and Buelens, J. Cryptanalysis of DES in the CFB mode. LNCS 773, Crypto 7893, pp. 212-223, Springer-Verlag, 1994.
  12. Rogaway, P., Bellare, M., Black, J. and Krovetz, T. OCB: A block-cipher mode of operation for efficient authenticated encryption. http://www.cs.ucdavis.edu/ rogaway, 2001.
Download


Paper Citation


in Harvard Style

Loe C. and Khoo K. (2006). PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACK . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 135-140. DOI: 10.5220/0002100301350140


in Bibtex Style

@conference{secrypt06,
author={Chuan-Wen Loe and Khoongming Khoo},
title={PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACK},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={135-140},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002100301350140},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACK
SN - 978-972-8865-63-4
AU - Loe C.
AU - Khoo K.
PY - 2006
SP - 135
EP - 140
DO - 10.5220/0002100301350140