DocumentCode :
1437890
Title :
On the Security of Blockwise Secure Modes of Operation Beyond the Birthday Bound
Author :
Joux, Antoine
Author_Institution :
DGA, Univ. de Versailles St-Quentin-en-Yvelines, Versailles, France
Volume :
56
Issue :
3
fYear :
2010
fDate :
3/1/2010 12:00:00 AM
Firstpage :
1239
Lastpage :
1246
Abstract :
In 2002, in two independent papers, Bellare, Kohno, and Namprempre and Joux, Martinet, and Valette introduced the notion of blockwise security for modes of operations. This notion stems from common practice, since in many applications, modes of operation for block ciphers do not process messages as atomic entities but in a incremental manner, block after block. Soon afterward, several papers showed that many modes of operation are already blockwise secure and that others can be made secure by simple modifications. In this paper, we revisit these results, by comparing possible attacks on modes of operation after the birthday bound is reached. Amusingly, in spite having essentially identical security proofs up to this bound, modes of operation in the blockwise model behave very differently than their counterparts in the regular model, once the birthday paradox bound is crossed.
Keywords :
cryptography; telecommunication security; birthday bound; block ciphers; blockwise security; Application software; Broadcasting; Computer security; Cryptography; Data security; Dissolved gas analysis; Hardware; Information security; Secure storage; Blockwise security; cycle finding algorithms; modes of operation;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2009.2039083
Filename :
5429140
Link To Document :
بازگشت