Skip to main content

Improved Block Cipher Counter Mode of Operation Schemes

  • Conference paper
Cyberspace Security and Defense: Research Issues

Part of the book series: NATO Science Series II: Mathematics, Physics and Chemistry ((NAII,volume 196))

  • 561 Accesses

Abstract

The main goals of presented research were the analysis of the base block cipher protectability from cryptanalytic attacks in standard modes of operation and the ways to increase the stream modes of operation security. We also paid special attention to the problem of the gamma overlapping. Therefore, we selected the counter mode as a basis for the new perspective modes, and investigated its property for the case of multiple encryption restarts with the same key. As result of our research, we are proposing two new schemes of modes of operation. They have advanced security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Morris Dworkin. Recommendation for Block Cipher Modes of Operation. Methods and Techniques. NIST Special Publication 800-38A, 2001.

    Google Scholar 

  2. FIPS 81, “DES Modes of Operation,” Federal Information Processing Standards Publication 81, U.S. Department of Commerce / National Bureau of Standards, National Technical Information Service, Springfield, Virginia, 1980.

    Google Scholar 

  3. ANSI X3.106, “American National Standard for Information Systems—Data Encryption Algorithm—Modes of Operation,” American National Standards Institute, 1983.

    Google Scholar 

  4. ISO 8732, “Banking—Key Management (wholesale),” International Organization for Standardization, Geneva, Switzerland, 1988 (first edition).

    Google Scholar 

  5. ISO/IEC 10116, “Information Processing—Modes of Operation for an n-bit Block Cipher Algorithm,” International Organization for Standardization, Geneva, Switzerland, 1991 (first edition).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer

About this paper

Cite this paper

Gorbenko, I., Golovashych, S. (2005). Improved Block Cipher Counter Mode of Operation Schemes. In: Kowalik, J.S., Gorski, J., Sachenko, A. (eds) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol 196. Springer, Dordrecht. https://doi.org/10.1007/1-4020-3381-8_16

Download citation

  • DOI: https://doi.org/10.1007/1-4020-3381-8_16

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-3379-7

  • Online ISBN: 978-1-4020-3381-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics