Security of symmetric encryption in the presence of ciphertext fragmentation

26Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.

Abstract

In recent years, a number of standardized symmetric encryption schemes have fallen foul of attacks exploiting the fact that in some real world scenarios ciphertexts can be delivered in a fragmented fashion. We initiate the first general and formal study of the security of symmetric encryption against such attacks. We extend the SSH-specific work of Paterson and Watson (Eurocrypt 2010) to develop security models for the fragmented setting. We also develop security models to formalize the additional desirable properties of ciphertext boundary hiding and robustness against Denial-of-Service (DoS) attacks for schemes in this setting. We illustrate the utility of each of our models via efficient constructions for schemes using only standard cryptographic components, including constructions that simultaneously achieve confidentiality, ciphertext boundary hiding and DoS robustness. © 2012 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Boldyreva, A., Degabriele, J. P., Paterson, K. G., & Stam, M. (2012). Security of symmetric encryption in the presence of ciphertext fragmentation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7237 LNCS, pp. 682–699). https://doi.org/10.1007/978-3-642-29011-4_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free