Known-IV attacks on triple modes of operation of block ciphers

7Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham’s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.

Cite

CITATION STYLE

APA

Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J., & Yi, O. (2001). Known-IV attacks on triple modes of operation of block ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2248, pp. 208–221). Springer Verlag. https://doi.org/10.1007/3-540-45682-1_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free