Known-IV attacks on triple modes of operation of block ciphers

Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)

    Abstract

    With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham’s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.

    Original languageEnglish
    Title of host publicationAdvances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
    EditorsColin Boyd
    PublisherSpringer Verlag
    Pages208-221
    Number of pages14
    ISBN (Print)3540429875, 9783540429876
    DOIs
    Publication statusPublished - 2001
    Event7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 - Gold Coast, Australia
    Duration: 2001 Dec 92001 Dec 13

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume2248
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001
    Country/TerritoryAustralia
    CityGold Coast
    Period01/12/901/12/13

    Bibliographical note

    Publisher Copyright:
    © Springer-Verlag Berlin Heidelberg 2001.

    Keywords

    • Block cipher
    • Mode of operation for DES
    • Triple DES

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Known-IV attacks on triple modes of operation of block ciphers'. Together they form a unique fingerprint.

    Cite this