Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

Jaechul Sung, Sangjin Lee, Jongin Lim, Wonil Lee, Okyeon Yi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)

    Abstract

    In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.

    Original languageEnglish
    Title of host publicationInformation Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings
    EditorsKwangjo Kim
    PublisherSpringer Verlag
    Pages103-113
    Number of pages11
    ISBN (Print)3540433198, 9783540433194
    DOIs
    Publication statusPublished - 2002
    Event4th International Conference on Information Security and Cryptology, ICISC 2001 - Seoul, Korea, Republic of
    Duration: 2001 Dec 62001 Dec 7

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume2288
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other4th International Conference on Information Security and Cryptology, ICISC 2001
    Country/TerritoryKorea, Republic of
    CitySeoul
    Period01/12/601/12/7

    Bibliographical note

    Publisher Copyright:
    © Springer-Verlag Berlin Heidelberg 2002.

    Keywords

    • Concrete Security
    • Modes of Operation
    • Pseudorandom Function Family
    • Symmetric Encryption Schemes

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Concrete security analysis of CTR-OFB and CTR-CFB modes of operation'. Together they form a unique fingerprint.

    Cite this