Blockwise-adaptive attackers - Revisiting the (In)security of some provably secure encryption modes: CBC, GEM, IACBC

被引:0
作者
Joux, A [1 ]
Martineti, G [1 ]
Valette, F [1 ]
机构
[1] DCSSI Crypto Lab, F-92131 Issy Les Moulineaux, France
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS | 2002年 / 2442卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we show that the natural and most common way of implementing modes of operation for cryptographic primitives often leads to insecure implementations. We illustrate this problem by attacking several modes of operation that were proved to be semantically secure against either chosen plaintext or chosen ciphertext attacks. The problem stems from the simple following fact: in the definition and proofs of semantic security, messages are considered as atomic objects that cannot be split; however, in most practical implementations, messages are subdivided into smaller chunks than can be easily manipulated. Depending on the implementation, each chunk may consist of one or several blocks of the underlying primitive. The key point here is that upon reception of a processed chunk, the attacker can now adapt his choice for the next chunk. Since the possibility of adapting within a single message is not taken into account in the current security models, this leaves room for unexpected attacks. We illustrate this new paradigm by attacking three symmetric and hybrid encryption schemes based on the chaining mode in spite of their security proofs.
引用
收藏
页码:17 / 30
页数:14
相关论文
共 14 条
[1]  
[Anonymous], P 38 S FDN COMP SCI
[2]  
BELLARE M, 2000, LECT NOTES COMPUTER, V1976
[3]  
BELLARE M, 2001, LECT NOTES COMPUTER, V2139, P292
[4]  
CORON J, 2002, LNCS, V2274, P17
[5]  
DESAI A, 2002, LECT NOTES COMPUTER, V2332
[6]  
Gennaro R, 1997, LECT NOTES COMPUT SC, V1294, P180
[7]  
GLIGOR V, 2001, LECT NOTES COMPUTER
[8]  
Halevi S., OBSERVATION REGARDIN
[9]  
JUTLA C, ENCRYPTION MODES ALM
[10]  
JUTLA C, 2001, LECT NOTES COMPUTER, V2045