Skip to main content

Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2288))

Abstract

In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare, A. Desai, E. JokiPii, and P. Rogaway, A Concrete Security Treetment of Symmetric Encryption: Analysis of the DES Modes of Operation, Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997. The revised version is available at http://www-cse.ucsd.edu/users/mihir.

  2. M. Bellare, J. Kilian, and P. Rogaway, The Security of the Cipher Block Chaining Message Authentication Code, Advanced in Cryptology-CRYPTO’94, LNCS 839, pp. 341–358, Springer-Verlag, 1994.

    Google Scholar 

  3. E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology-CRYPTO’90, LNCS 537, pp. 2–21, Springer-Verlag, 1991.

    Google Scholar 

  4. E. Biham and A. Shamir, Differential cryptanalysis of the full 16-round DES, Advances in Cryptology-CRYPTO’92, LNCS 740, pp. 487–496, Springer-Verlag, 1992.

    Google Scholar 

  5. J. Daeman, L. Knudsen, and V. Rijmen, The Block Cipher Square, Fast Software Encryption 1997, LNCS 1636, pp. 46–59, Springer-Verlag, 1997.

    Google Scholar 

  6. W. Diffie and M. Hellman, Privacy and Authentication: An introduction to Cryptography, Proceedings of the IEEE, 67(1979), pp. 397–427, 1979.

    Google Scholar 

  7. S. Goldwasser and S. Micali, Probabilistic Encryption, Journal of Computer and System Sciences, Vol.28, pp. 270–279, April 1984.

    Google Scholar 

  8. Stefan Lucks, The Saturation Attack-a Bait for Two fish, Fast Software Encrption 2001, 2001, to appear.

    Google Scholar 

  9. M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology-EUROCRYPT’93, LNCS 765, pp. 386–397, Springer-Verlag, 1994.

    Google Scholar 

  10. M. Matsui, The first experimental cryptanalysis of the Data Encryption Standard, Advances in Cryptology-CRYPTO’94, LNCS 839, pp. 1–11, Springer-Verlag, 1994.

    Google Scholar 

  11. National Bureau of Standards, DES modes of operation, FIPS-Pub.46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., December 1980.

    Google Scholar 

  12. National Institute of Standards and Technology, AES Mode of Operation Development Effort, http://csrc.nist.gov/encryption/modes.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sung, J., Lee, S., Lim, J., Lee, W., Yi, O. (2002). Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. In: Kim, K. (eds) Information Security and Cryptology — ICISC 2001. ICISC 2001. Lecture Notes in Computer Science, vol 2288. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45861-1_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-45861-1_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43319-4

  • Online ISBN: 978-3-540-45861-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics