Known-IV Attacks on Triple Modes of Operation of Block Ciphers

  • Authors:
  • Deukjo Hong;Jaechul Sung;Seokhie Hong;Wonil Lee;Sangjin Lee;Jongin Lim;Okyeon Yi

  • Affiliations:
  • -;-;-;-;-;-;-

  • Venue:
  • ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE'98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham's results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.