TY - GEN
T1 - Concrete security analysis of CTR-OFB and CTR-CFB modes of operation
AU - Sung, Jaechul
AU - Lee, Sangjin
AU - Lim, Jongin
AU - Lee, Wonil
AU - Yi, Okyeon
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2002.
PY - 2002
Y1 - 2002
N2 - In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.
AB - In [1], they gave the notions of security for the symmetric encryption and provided a concrete security analysis of the XOR, CTR, and CBC schemes. Among the three schemes, the CTR scheme achieves the best concrete security in their analysis. In this paper, we propose the new schemes, CTR-OFB and CTR-CFB, which have the security as same as that of the CTR scheme on the point of the concrete security analysis and achieve higher resistance against some practical attacks than the CTR scheme.
KW - Concrete Security
KW - Modes of Operation
KW - Pseudorandom Function Family
KW - Symmetric Encryption Schemes
UR - http://www.scopus.com/inward/record.url?scp=24944503795&partnerID=8YFLogxK
U2 - 10.1007/3-540-45861-1_9
DO - 10.1007/3-540-45861-1_9
M3 - Conference contribution
AN - SCOPUS:24944503795
SN - 3540433198
SN - 9783540433194
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 103
EP - 113
BT - Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings
A2 - Kim, Kwangjo
PB - Springer Verlag
T2 - 4th International Conference on Information Security and Cryptology, ICISC 2001
Y2 - 6 December 2001 through 7 December 2001
ER -