New efficient padding methods secure against padding oracle attacks

Hyung Chul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the padding during decryption. Of the ten existing padding methods, only two (ABYT-PAD and ABIT-PAD) can withstand padding oracle attacks. However, these methods are not efficient since they either use a random number generator or require MAC verification in applications. The three new padding methods proposed in this paper are secure against padding oracle attacks and more efficient compared to the two aforementioned padding methods.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers
EditorsAaram Yun, Soonhak Kwon
PublisherSpringer Verlag
Pages329-342
Number of pages14
ISBN (Print)9783319308395
DOIs
Publication statusPublished - 2016
Event18th International Conference on Information Security and Cryptology, ICISC 2015 - Seoul, Korea, Republic of
Duration: 2015 Nov 252015 Nov 27

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9558
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other18th International Conference on Information Security and Cryptology, ICISC 2015
Country/TerritoryKorea, Republic of
CitySeoul
Period15/11/2515/11/27

Bibliographical note

Publisher Copyright:
© Springer International Publishing Switzerland 2016.

Keywords

  • CBC mode of operation
  • Padding methods
  • Padding oracle attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'New efficient padding methods secure against padding oracle attacks'. Together they form a unique fingerprint.

Cite this