Attacking predictable IPsec ESP initialization vectors

3Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Predictable initialization vectors in IPsec ESP encryption, allowed by the IPsec specifications and used by most implementations, compromise IPsec confidentiality. By using an adaptive chosen plaintext attack, an attacker can break low entropy plaintext blocks using brute force, and confirm guesses of the contents of arbitrary plaintext blocks. We analyze the preconditions and the seriousness of such attacks, and provide results of practical attack experiments.

Cite

CITATION STYLE

APA

Vaarala, S., Nuopponen, A., & Virtanen, T. (2002). Attacking predictable IPsec ESP initialization vectors. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2513, pp. 160–172). Springer Verlag. https://doi.org/10.1007/3-540-36159-6_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free