In this chapter, we show how security protocols can be attacked by exploiting the underlying block cipher modes of operation. We first present a comprehensive treatment of the properties and weaknesses of standard modes of operation. We then show why all modes of operation should not be used with public-key ciphers in public-key security protocols. This includes the cipher block chaining (CBC) mode when there is no integrity protection of the initialisation vector (IV). In particular, we show that it is possible in such instances to replace a block at the beginning, middle, or end of a CBC-encrypted message. We further demonstrate that the security of the electronic codebook (ECB) mode, and show that in the absence of integrity, one could e...
Abstract—Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-s...
International audienceTriggered by the increasing deployment of embedded cryptographic devices (e.g....
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
The key separation principle for different modes of operation of the block ciphers is a cryptographi...
Abstract. The security of interchanged use of modes of operation of block ciphers have not been disc...
. There are many cases in the literature in which reuse of the same key material for different funct...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceI...
A large variety of methods for using block ciphers, so called `modes of operation', have been propos...
Modern Internet protocols support several modes of operation in encryption tasks for data confidenti...
AbstractIn this paper we report on an analysis for finding known-pair and chosen-text attacks in pro...
International audienceWe present a Hoare logic for proving semantic security and determining exact s...
Modes that may be appropriate and secure in one application or environment sometimes fail badly in o...
Abstract. This paper is primarily concerned with the CBC block cipher mode. The impact on the usabil...
We present a new encryption mode for block ciphers. The mode is efficient and is secure against chos...
. In this paper we cryptanalyze the proposed (almost accepted) ANSI X9.52 CBCM mode. The CBCM mode i...
Abstract—Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-s...
International audienceTriggered by the increasing deployment of embedded cryptographic devices (e.g....
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
The key separation principle for different modes of operation of the block ciphers is a cryptographi...
Abstract. The security of interchanged use of modes of operation of block ciphers have not been disc...
. There are many cases in the literature in which reuse of the same key material for different funct...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceI...
A large variety of methods for using block ciphers, so called `modes of operation', have been propos...
Modern Internet protocols support several modes of operation in encryption tasks for data confidenti...
AbstractIn this paper we report on an analysis for finding known-pair and chosen-text attacks in pro...
International audienceWe present a Hoare logic for proving semantic security and determining exact s...
Modes that may be appropriate and secure in one application or environment sometimes fail badly in o...
Abstract. This paper is primarily concerned with the CBC block cipher mode. The impact on the usabil...
We present a new encryption mode for block ciphers. The mode is efficient and is secure against chos...
. In this paper we cryptanalyze the proposed (almost accepted) ANSI X9.52 CBCM mode. The CBCM mode i...
Abstract—Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-s...
International audienceTriggered by the increasing deployment of embedded cryptographic devices (e.g....
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...