Abstract
In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
M. Bellare, A. Desai, E. JokiPii, and P. Rogaway, A Concrete Security Treetment of Symmetric Encryption: Analysis of the DES Modes of Operation, Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997. The revised version is available at http://www-cse.ucsd.edu/users/mihir.
M. Bellare, J. Kilian, and P. Rogaway, The Security of the Cipher Block Chaining Message Authentication Code, Advanced in Cryptology-CRYPTO’94, LNCS 839, pp. 341–358, Springer-Verlag, 1994.
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology-CRYPTO’90, LNCS 537, pp. 2–21, Springer-Verlag, 1991.
E. Biham and A. Shamir, Differential cryptanalysis of the full 16-round DES, Advances in Cryptology-CRYPTO’92, LNCS 740, pp. 487–496, Springer-Verlag, 1992.
J. Daeman, L. Knudsen, and V. Rijmen, The Block Cipher Square, Fast Software Encryption 1997, LNCS 1636, pp. 46–59, Springer-Verlag, 1997.
W. Diffie and M. Hellman, Privacy and Authentication: An introduction to Cryptography, Proceedings of the IEEE, 67(1979), pp. 397–427, 1979.
S. Goldwasser and S. Micali, Probabilistic Encryption, Journal of Computer and System Sciences, Vol.28, pp. 270–279, April 1984.
Stefan Lucks, The Saturation Attack-a Bait for Two fish, Fast Software Encrption 2001, 2001, to appear.
M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology-EUROCRYPT’93, LNCS 765, pp. 386–397, Springer-Verlag, 1994.
M. Matsui, The first experimental cryptanalysis of the Data Encryption Standard, Advances in Cryptology-CRYPTO’94, LNCS 839, pp. 1–11, Springer-Verlag, 1994.
National Bureau of Standards, DES modes of operation, FIPS-Pub.46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., December 1980.
National Institute of Standards and Technology, AES Mode of Operation Development Effort, http://csrc.nist.gov/encryption/modes.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sung, J., Lee, S., Lim, J., Lee, W., Yi, O. (2002). Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_9
Download citation
DOI: https://doi.org/10.1007/3-540-45861-1_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43319-4
Online ISBN: 978-3-540-45861-6
eBook Packages: Springer Book Archive