Related-mode attacks on block cipher modes of operation
In this paper, we present a generalization of the notion of the recently proposed related-cipher attacks. In particular, we show that when the cryptanalyst has access to an oracle under one mode, then almost all other related-cipher modes can be attacked with ease. Typically only one chosen plaintex...
| Main Authors: | Phan, , RCW, Siddiqi, , MU |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2354/ |
Similar Items
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Flood Prediction Based On Deep Learning Networks With Variational Mode Decomposition
by: Ni, Chenmin
Published: (2024)
by: Ni, Chenmin
Published: (2024)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Solving Radiative Transfer Equation (RTE) in Time-Dependent Mode
by: Ow Shen, Wah, et al.
Published: (2008)
by: Ow Shen, Wah, et al.
Published: (2008)
Single core hardware module to implement encryption in TECB mode
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
TEMPORAL VIDEO COMPRESSION USING MODE FACTOR AND POLYNOMIAL FITTING ON WAVELET COEFFICIENTS
by: Devi, TN, et al.
Published: (2009)
by: Devi, TN, et al.
Published: (2009)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Parallel Connection of DC/AC Switched Mode Power Converter in Utility Distribution System
by: Kuan Lee, Choo
Published: (2008)
by: Kuan Lee, Choo
Published: (2008)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Fuzzy Neural Networks Controller for a Chaotic Nonlinear Gyro Using Sliding-Mode Surfaces
by: Seyed Alireza, Mohseni, et al.
Published: (2008)
by: Seyed Alireza, Mohseni, et al.
Published: (2008)
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
Voltage injection switching inductor (VISI) method for fast transient response in switch mode power supplies
by: Jegandren, J., et al.
Published: (2008)
by: Jegandren, J., et al.
Published: (2008)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
A Dual-Mode Input Voltage Modulation Control Scheme for Voltage Multiplier Based X-Ray Power Supply
by: Iqbal, S., et al.
Published: (2008)
by: Iqbal, S., et al.
Published: (2008)
Patient video compression using 3-D block transforms for telemedicine applications
by: Sriraam, N, et al.
Published: (2006)
by: Sriraam, N, et al.
Published: (2006)
Multiple error detection and correction based on redundant residue number systems
by: Tor Goh, Vik, et al.
Published: (2008)
by: Tor Goh, Vik, et al.
Published: (2008)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
CST132 - OPERATING SYSTEMS APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CTS 301 - OPERATING SYSTEMS - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CST232 – Operating Systems (Sistem Pengendalian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CST232 – Operating Systems January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
Similar Items
-
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005) -
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005) -
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018) -
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021) -
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)