Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers

Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi

    Research output: Contribution to journalArticlepeer-review

    Abstract

    Normally, it has been believed that the initial values of cryptographic schemes do not need to be managed secretly unlike the secret keys. However, we show that multiple modes of operation of block ciphers can suffer a loss of security by the state of the initial values. We consider several attacks according to the environment of the initial values; known-IV attack, known-in-advance-IV attack, and replayed-and-known-IV attack. Our attacks on cascaded three-key triple modes of operation requires 3-7 blocks of plaintexts (or ciphertexts) and 3 • 256-9 • 256 encryptions. We also give the attacks on multiple modes proposed by Biham.

    Original languageEnglish
    Pages (from-to)441-462
    Number of pages22
    JournalJournal of Cryptology
    Volume19
    Issue number4
    DOIs
    Publication statusPublished - 2006 Oct

    Keywords

    • Block ciphers
    • Cryptanalysis
    • Known-IV attacks
    • Knownin- advance-IV attacks
    • Multiple modes of operation
    • Replayed-and-known-IV attacks

    ASJC Scopus subject areas

    • Software
    • Computer Science Applications
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers'. Together they form a unique fingerprint.

    Cite this