Abstract
The main goals of presented research were the analysis of the base block cipher protectability from cryptanalytic attacks in standard modes of operation and the ways to increase the stream modes of operation security. We also paid special attention to the problem of the gamma overlapping. Therefore, we selected the counter mode as a basis for the new perspective modes, and investigated its property for the case of multiple encryption restarts with the same key. As result of our research, we are proposing two new schemes of modes of operation. They have advanced security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Morris Dworkin. Recommendation for Block Cipher Modes of Operation. Methods and Techniques. NIST Special Publication 800-38A, 2001.
FIPS 81, “DES Modes of Operation,” Federal Information Processing Standards Publication 81, U.S. Department of Commerce / National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1980.
ANSI X3.106, “American National Standard for Information Systems—Data Encryption Algorithm—Modes of Operation,” American National Standards Institute, 1983.
ISO 8732, “Banking—Key Management (wholesale),” International Organization for Standardization, Geneva, Switzerland, 1988 (first edition).
ISO/IEC 10116, “Information Processing—Modes of Operation for an n-bit Block Cipher Algorithm,” International Organization for Standardization, Geneva, Switzerland, 1991 (first edition).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer
About this paper
Cite this paper
Gorbenko, I., Golovashych, S. (2005). Improved Block Cipher Counter Mode of Operation Schemes. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol 196. Springer, Dordrecht. https://doi.org/10.1007/1-4020-3381-8_16
Download citation
DOI: https://doi.org/10.1007/1-4020-3381-8_16
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-3379-7
Online ISBN: 978-1-4020-3381-0
eBook Packages: Computer ScienceComputer Science (R0)