Abstract
With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham’s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings |
Editors | Colin Boyd |
Publisher | Springer Verlag |
Pages | 208-221 |
Number of pages | 14 |
ISBN (Print) | 3540429875, 9783540429876 |
DOIs | |
Publication status | Published - 2001 |
Event | 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 - Gold Coast, Australia Duration: 2001 Dec 9 → 2001 Dec 13 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 2248 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 |
---|---|
Country/Territory | Australia |
City | Gold Coast |
Period | 01/12/9 → 01/12/13 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 2001.
Keywords
- Block cipher
- Mode of operation for DES
- Triple DES
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science