期刊文献+

对OCB模式的冲突攻击

Collision Attacks on OCB
下载PDF
导出
摘要 OCB模式是可并行处理的分组加密模式,在加密的同时还提供了鉴别服务.速度快是OCB模式的一个重要特点,但这也导致了其安全隐患问题。文章给出了一种新的对OCB模式的攻击方法,当某种冲突发生时,很容易对OCB模式进行攻击,使其完全丧失鉴别的能力。这种攻击的限制条件很少,攻击范围很大,而且容易实现.因此,为了保证OCB模式鉴别上的安全,必须限制其单个密钥下处理的数据量,从而限制了OCB模式的应用范围. OCB is a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. High-speed is one of the most important advantages.But it also leads to the problems on security.In this paper,a new attack scheme on OCB is given out.When a collision occurs attacks are quite effective on the OCB block cipher mode. OCB loses its authentication capability to keep adequate authentication security.The scheme is easy to be achieved with little limitation.And it can threaten almost the whole message.So OCB has to be limited in the amount of data it processes.This restriction casts doubt on the wisdom of using OCB.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第4期158-161,共4页 Computer Engineering and Applications
关键词 工作模式 OCB模式 分组加密模式 鉴别-加密模式 冲突攻击 modes of operation,OCB mode,block cipher mode,authentication-encryption mode,collision attack
  • 相关文献

参考文献8

  • 1吴文玲.简评AES工作模式[J].中国科学院研究生院学报,2002,19(3):324-333. 被引量:5
  • 2Niels Ferguson,NIST Public Comments for symmetric key block ciphers:Collision attacks on OCB.Available from http://www.cs.ucdavis.edu/-rogaway/ocb, 2002.
  • 3Philip Rogaway,Mihir Bellare,John Black et al,OCB :a block-cipher mode of operation for efficient authenticated encryption[C],In:Proceedings of the 8tth ACM Conference on Computer and Communications Security ,2001 : 196-205.
  • 4Philip Rogaway.OCB Mode : Parallelizable authenticated encryption. Symmetric Key Block Cipher Modes of Operation Workshop.Available from http://csrc.nist.gov/encryption/modes/workshop,2000-10.
  • 5M Bellare,P Rogaway.Random oracles are practical :A paradigm for designing efficient protocols[C].In:Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993:62-73.
  • 6M Bellare,J Killian,P Rogaway.The security of cipher block chaining[C]. In:Advances in Cryptology-CRYPTO'94,1995 :341-358.
  • 7Karl Brincat,Chris J Mitchell.New CBC-MAC forgery attacks[C].In: Australasian Conference on Information Security and Privacy(ACISP 2001 ),Lecture Notes in Computer Science,Vol 2119,Springer-Verlag, 2001:3-14.
  • 8M Bellare,A Desai,E Jokipii et al.A concrete security treatment of symmetric encryption :Analysis of the DES modes of operation[C].In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science ( FOCS97 ), 1997 : 394 -403.

二级参考文献9

  • 1[1]NATIONAL BUREAU OF STANDARDS(USA). DES Modes of Operation. Federal Information Processing Standard(FIPS) Publication81,1980; http://www. itl. nist. gov/div897/pubs/fip81. htm
  • 2[2]ht tp://www. nist. gov/modes/
  • 3[3]M Bellare, A Desai, E Jokipii, P Rogaway. A Concrete Security Treatment of Symmetric Encryption. In: Proceedings of the 38th Symposium on Foundations Computer Science, IEEE, 1997,394~403
  • 4[4]M Bellare,J killian, P Rogaway. The Security of Cipher Block Chaining. Advances in Cryptology-CRYPTO'94,1995.341~358
  • 5[5]M Bellare, C Namprempre. Authenticated encryption:Relations Among Notions and Analysis of Generic Composition Paradigm. Advances in Cryptology-ASIACRYPT'00, Springer-Verlag, 2000
  • 6[6]V D Gligor, P Donescu. Integrity Conditions for Symmetric Encryption. In: University of Maryland. Computer Science Technical Report CS-TR-3958, 1998
  • 7[7]C S Jutla. Encryption Modes with Almost Free Message Integrity. Advances in Cryptology-EUROCRYPT'01, LNCS2045. SpringerVerlag, 2001
  • 8[8]M Luby, C Rackoff. How to Construct Pseudorandom Permutations From Pseudorandom Function. SIAM J Computing. 1998, 17(2)
  • 9[9]J Katz, M Yung. Unforgrable Encryption and Adaptively Secure Modes of Operation. Fast Software Encryption'00. Springer-Verlag2000

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部