Cryptanalysis of two variants of PCBC mode when used for message integrity

12Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The PCBC block cipher mode of operation has many variants, of which one, due to Meyer and Matyas, dates back over 20 years. Whilst a particularly simple variant of PCBC has long been known to be very weak when used for data integrity protection, the Meyer-Matyas variant has not previously been attacked. In this paper we cryptanalyse this mode, and show that it possesses a serious weakness when used for data integrity protection. Specifically, we show how to construct an existential forgery using only a single known ciphertext message and a modest amount of known plaintext (this could be as little as three plaintext blocks). We also describe a ciphertext-only existential forgery attack against another, recently proposed, PCBC-variant called M-PCBC. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Mitchell, C. J. (2005). Cryptanalysis of two variants of PCBC mode when used for message integrity. In Lecture Notes in Computer Science (Vol. 3574, pp. 560–571). Springer Verlag. https://doi.org/10.1007/11506157_47

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free