Technical note: complementarity attacks and control vectors

  • Authors:
  • Dennis Longley;Stephen M. Matyas

  • Affiliations:
  • Information Security Research Centre, Queensland University of Technology, GPO Box 2434, Brisbane, Queensland 4001, Australia;IBM Federal Systems Company, 9500 Godwin Drive, Manassas, Virginia

  • Venue:
  • IBM Systems Journal
  • Year:
  • 1993

Quantified Score

Hi-index 0.00

Visualization

Abstract

A control vector is a data structure that specifies the nature and role of an associated cryptographic key. The control vector is checked by software and cryptographic hardware in order to limit the range of permissible operations to be undertaken with ciphertext produced with the key. The linking of the control vector and cryptographic key is such that attempts to modify, or substitute, control vectors will cause the subsequent processing to operate with a corrupted key, and hence ensure protection of data encrypted with the genuine key. A potential attack on the control vector approach is described in which the complement of the control vector is substituted. The manner in which such attacks are thwarted by the IBM implementation of control vectors is also described.