Predictable initialization vectors in IPsec ESP encryption, allowed by the IPsec specifications and used by most implementations, compromise IPsec confidentiality. By using an adaptive chosen plaintext attack, an attacker can break low entropy plaintext blocks using brute force, and confirm guesses of the contents of arbitrary plaintext blocks. We analyze the preconditions and the seriousness of such attacks, and provide results of practical attack experiments.
CITATION STYLE
Vaarala, S., Nuopponen, A., & Virtanen, T. (2002). Attacking predictable IPsec ESP initialization vectors. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2513, pp. 160–172). Springer Verlag. https://doi.org/10.1007/3-540-36159-6_14
Mendeley helps you to discover research relevant for your work.