Abstract
This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the padding during decryption. Of the ten existing padding methods, only two (ABYT-PAD and ABIT-PAD) can withstand padding oracle attacks. However, these methods are not efficient since they either use a random number generator or require MAC verification in applications. The three new padding methods proposed in this paper are secure against padding oracle attacks and more efficient compared to the two aforementioned padding methods.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers |
Editors | Aaram Yun, Soonhak Kwon |
Publisher | Springer Verlag |
Pages | 329-342 |
Number of pages | 14 |
ISBN (Print) | 9783319308395 |
DOIs | |
Publication status | Published - 2016 |
Event | 18th International Conference on Information Security and Cryptology, ICISC 2015 - Seoul, Korea, Republic of Duration: 2015 Nov 25 → 2015 Nov 27 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 9558 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 18th International Conference on Information Security and Cryptology, ICISC 2015 |
---|---|
Country/Territory | Korea, Republic of |
City | Seoul |
Period | 15/11/25 → 15/11/27 |
Bibliographical note
Publisher Copyright:© Springer International Publishing Switzerland 2016.
Keywords
- CBC mode of operation
- Padding methods
- Padding oracle attack
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science