Advertisement

Practical Symmetric On-Line Encryption

  • Pierre-Alain Fouque
  • Gwenaëlle Martinet
  • Guillaume Poupard
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2887)

Abstract

This paper addresses the security of symmetric cryptosystems in the blockwise adversarial model. At Crypto 2002, Joux, Martinet and Valette have proposed a new kind of attackers against several symmetric encryption schemes. In this paper, we first show a generic technique to thwart blockwise adversaries for a specific class of encryption schemes. It consists in delaying the output of the ciphertext block. Then we provide the first security proof for the CFB encryption scheme, which is naturally immune against such attackers.

Keywords

Symmetric encryption blockwise adversary chosen plaintext attacks 

References

  1. 1.
    Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: Proceedings of the 38th Symposium of Fundations of Computer Science. IEEE, Los Alamitos (1997)Google Scholar
  2. 2.
    Bellare, M., Impagliazzo, R.: A tool for obtaining tighter security analysis of pseudorandom function based constructions, with applications to PRP → PRF conversion (February 1999) (manuscript), Available at http://www-cse.ucsd.edu/users/russell
  3. 3.
    Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)Google Scholar
  4. 4.
    Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 92–108. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences 28, 270–299 (1984)zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Hall, C., Wagner, D., Kelsey, J., Schneier, B.: Building PRFs from PRPs. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 370–389. Springer, Heidelberg (1998)Google Scholar
  7. 7.
    Hellman, M.E.: A Cryptanalytic Time-Memory Trade-Off. IEEE Transactions on Information Theory IT-26(4), 401–406 (1980)CrossRefMathSciNetGoogle Scholar
  8. 8.
    Joux, A., Martinet, G., Valette, F.: Blockwise-Adaptive Attackers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17–30. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Jutla, C.: Encryption modes with almost free message integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529–544. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  11. 11.
    NIST. FIPS PUB 81 - DES Modes of Operation (December 1980)Google Scholar
  12. 12.
    Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In: Eighth ACM conference on Computer and Communications Security. ACM Press, New York (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Pierre-Alain Fouque
    • 1
  • Gwenaëlle Martinet
    • 1
  • Guillaume Poupard
    • 1
  1. 1.DCSSI Crypto LabParis 07France

Personalised recommendations