Results 11  20
of
760
OCB: A BlockCipher Mode of Operation for Efficient Authenticated Encryption
, 2001
"... We describe a parallelizable blockcipher mode of operation that simultaneously provides privacy and authenticity. OCB encryptsandauthenticates a nonempty string M # {0, 1} # using #M /n# + 2 blockcipher invocations, where n is the block length of the underlying block cipher. Additional ov ..."
Abstract

Cited by 204 (24 self)
 Add to MetaCart
We describe a parallelizable blockcipher mode of operation that simultaneously provides privacy and authenticity. OCB encryptsandauthenticates a nonempty string M # {0, 1} # using #M /n# + 2 blockcipher invocations, where n is the block length of the underlying block cipher. Additional
Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption
, 2005
"... Block ciphers generally have fixed and relatively small input length. Thus they are often used in some mode of operations (e.g., ECB, CBC, CFB, and CTR) that enables the encryption of longer messages. Unfortunately, all these modes of operation reveal some information on their inputs or on relations ..."
Abstract
 Add to MetaCart
Block ciphers generally have fixed and relatively small input length. Thus they are often used in some mode of operations (e.g., ECB, CBC, CFB, and CTR) that enables the encryption of longer messages. Unfortunately, all these modes of operation reveal some information on their inputs
The order of encryption and authentication for protecting communications (or: how Secure is SSL?)
, 2001
"... We study the question of how to generically compose symmetric encryption and authentication when building “secure channels” for the protection of communications over insecure networks. We show that any secure channels protocol designed to work with any combination of secure encryption (against chose ..."
Abstract

Cited by 152 (7 self)
 Add to MetaCart
for an active attacker). The same applies to the encryptandauthenticate method used in SSH. On the positive side we show that the authenticatethenencrypt method is secure if the encryption method in use is either CBC mode (with an underlying secure block cipher) or a stream cipher (that xor the data with a
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
 in the PKCS #7 format. Cryptology ePrint Archive, Report 2003/098
, 2003
"... Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3] scheme allows an attacker to invert the underlying block cipher, provided she has access to a validpadding oracle which for each input ciphertext tells her whether the corresponding plaintext has a ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3] scheme allows an attacker to invert the underlying block cipher, provided she has access to a validpadding oracle which for each input ciphertext tells her whether the corresponding plaintext has a
BlockwiseAdaptive Attackers  Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC
 In Proceedings of Advances in Cryptology  Crypto 2002, LNCS 2442
, 2002
"... In this paper, we show that the natural and most common way of implementing modes of operation for cryptographic primitives often leads to insecure implementations. We illustrate this problem by attacking several modes of operation that were proved to be semantically secure against either chosen ..."
Abstract

Cited by 17 (1 self)
 Add to MetaCart
In this paper, we show that the natural and most common way of implementing modes of operation for cryptographic primitives often leads to insecure implementations. We illustrate this problem by attacking several modes of operation that were proved to be semantically secure against either
Weaknesses in the Key Scheduling Algorithm of RC4
 PROCEEDINGS OF THE 4TH ANNUAL WORKSHOP ON SELECTED AREAS OF CRYPTOGRAPHY
, 2001
"... In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with nonnegligible probabilit ..."
Abstract

Cited by 270 (1 self)
 Add to MetaCart
of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages. Our new passive ciphertextonly attack on this mode can recover an arbitrarily long key in a negligible amount of time which grows only linearly with its size, both for 24
Feistel Finite Set Encryption Mode
"... In many applications, such as encryption of credit card numbers, it is desirable to encrypt items from an arbitrarily sized set onto that same set. Unfortunately, conventional cipher modes such as ECB, CBC, or CTR are unsuitable for this purpose. Feistel Finite Set Encryption Mode (FFSEM) allows enc ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
In many applications, such as encryption of credit card numbers, it is desirable to encrypt items from an arbitrarily sized set onto that same set. Unfortunately, conventional cipher modes such as ECB, CBC, or CTR are unsuitable for this purpose. Feistel Finite Set Encryption Mode (FFSEM) allows
1 Generating and Testing Random Key for Image Encryption using ECB and CBC Modes
, 2004
"... Abstract: A proposed method for generating random key sequences for image encryption is implemented in this paper. The degree of randomness of the generated sequences is tested by the five statistical tests. In addition, the level of security level of the generated sequences is evaluated by computin ..."
Abstract
 Add to MetaCart
by computing entropy and similarity values with the help of the histograms to the encrypted images. The encryption is done by using ECB and CBC modes. The results showed that at least 79 % of the generated sequences pass randomness constraints. The paper showed that as the number of the statistical tests
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
 In FSE ’00
, 1978
"... Abstract. We find certain neglected issues in the study of privatekey encryption schemes. For one, privatekey encryption is generally held to the same standard of security as publickey encryption (i.e., indistinguishability) even though usage of the two is very different. Secondly, though the imp ..."
Abstract

Cited by 45 (3 self)
 Add to MetaCart
the importance of secure encryption of single blocks is well known, the security of modes of encryption (used to encrypt multiple blocks) is often ignored. With this in mind, we present definitions of a new notion of security for privatekey encryption called encryption unforgeability which captures an adversary
On the Security of CTR + CBCMAC NIST Modes of Operation  Additional CCM Documentation
"... We analyze the security of the CTR + CBCMAC (CCM) encryption mode. This mode, proposed by Doug Whiting, Russ Housley, and Niels Ferguson, combines the CTR ("counter") encryption mode with CBCMAC message authentication and is based on a block cipher such as AES. We present concrete lo ..."
Abstract
 Add to MetaCart
We analyze the security of the CTR + CBCMAC (CCM) encryption mode. This mode, proposed by Doug Whiting, Russ Housley, and Niels Ferguson, combines the CTR ("counter") encryption mode with CBCMAC message authentication and is based on a block cipher such as AES. We present concrete
Results 11  20
of
760