scispace - formally typeset
Proceedings ArticleDOI

Using the Collision Attack for Breaking Cryptographic Modes

Reads0
Chats0
TLDR
In this paper , the authors present the attack, along with background mathematics, an example, and the experimental results reached by a team led by Carlson, with the suggestion that the side channel attack renders modes futile.
Abstract
Presently the cipher system that is considered to be the industry gold standard is the Advanced Encryption Standard paired with the Cipher Block Chaining cryptographic mode (AES with CBC). The key space and randomization create such a large problem that even a Brute Force attack is thought to be mathematically infeasible. However, separate research by McGrew and Carlson has resulted in an attack known as either the Improbability or Collision attack that shows that the system can be broken with a reasonable amount of input data. In this paper, we present the attack, along with background mathematics, an example, and the experimental results reached by a team led by Carlson. Extensions to other modes are also presented, with the suggestion that the side channel attack renders modes futile. In fact, applying modes reveals so much information that employing them may even compromise the security of the transmitted message.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review

TL;DR: In this article , the authors provide an all-inclusive and lucid review of the current state of anomalies and security concepts related to the Internet of Things (IoT) by examining the current attacks, threats, and cutting-edge solutions.
References
More filters
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI

Prediction and entropy of printed English

TL;DR: A new method of estimating the entropy and redundancy of a language is described, which exploits the knowledge of the language statistics possessed by those who speak the language, and depends on experimental results in prediction of the next letter when the preceding text is known.
Book ChapterDOI

Electromagnetic Analysis: Concrete Results

TL;DR: This work describes electromagnetic experiments conducted on three different cmos chips, featuring different hardware protections and executing a des, an alleged comp128 and an rsa, where the complete key material was successfully retrieved.
Journal ArticleDOI

Cryptography and Computer Privacy

Horst Feistel
- 01 May 1973 -