Abstract
In a paper cryptanalyzing many triple modes of operation, Biham proposed four new triple modes and five new quadruple modes of operation for DES. It was conjectured that the complexity (in a particular threat model) of breaking the triple modes is at least 2112 and that the quadruple modes are more secure than any triple mode.
We present new attacks on all but one of the proposed modes. We can break all but two of Biham’s proposed modes with at most 256 off-line trial encryptions and between 2 and 232 (depending upon the mode) chosen-IV chosen texts; another mode can be broken with somewhat more work. This raises questions about the suitability of the proposed modes, and provides further evidence for the fragility of inner chaining; however, we emphasize that our results do not disprove Biham’s conjectures, as we rely on an extended attack model which admits more powerful adversaries who can mount chosen-IV queries, a capability denied to them in Biham’s model.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham, “On Modes of Operation,” Fast Software Encryption’ 93, LNCS 809, Springer-Verlag, 1994.
E. Biham, “Cryptanalysis of Multiple Modes of Operation,” ASIACRYPT’ 94, LNCS 917, Springer-Verlag, 1994.
E. Biham, “Cryptanalysis of Triple-Modes of Operation,” Technion technical report CS 885, 1996.
D. Coppersmith, D.B. Johnson, and S.M. Matyas, “Triple DES Cipher Block Chaining with Output Feedback Masking,” IBM Journal of Research and Development, vol 40, no 2, 1996.
P.C. van Oorschot and M.J. Wiener, “Improving implementable meet-in-the-middle attacks by orders of magnitude,” CRYPTO’96, pages 228–236, Springer-Verlag, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wagner, D. (1998). Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. In: Vaudenay, S. (eds) Fast Software Encryption. FSE 1998. Lecture Notes in Computer Science, vol 1372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69710-1_17
Download citation
DOI: https://doi.org/10.1007/3-540-69710-1_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64265-7
Online ISBN: 978-3-540-69710-7
eBook Packages: Springer Book Archive