Abstract
In this paper, we propose a novel block cipher mode of operation (BCMO for short), named Output Protection Chain (OPC for short), which as a symmetric encryption structure is different from other existing BCMOs in that it employs two keys, rather than one key, to protect the output of the mode. The security threats of chosen-plaintext attacks on three existing common BCMOs, including the Cipher Feedback mode (CFB), the Output Feedback mode (OFB), and the Counter mode (CTR), are also analyzed. After that, we explain why the OPC mode (or simply the OPC) can effectively avoid chosen-plaintext attacks, and why its security level is higher than those of CFB, OFB, and CTR.
Chapter PDF
Similar content being viewed by others
Keywords
References
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall (January 2010)
National Institute of Standards and Technology, NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation Methods and Techniques (December 2001)
Hudde, H.: Building Stream Ciphers from Block Ciphers and their Security. Seminararbeit Ruhr-Universität Bochum (February 2009), http://imperia.rz.rub.de:9085/imperia/md/content/seminare/itsws08_09/hudde.pdf
Wang, D., Lin, D., Wu, W.: Related-Mode Attacks on CTR Encryption Mode. International Journal of Network Security 4(3), 282–287 (2007)
Huang, Y.F., Leu, F.Y., Chiu, C.H., Lin, I.L.: Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. Journal of Universal Computer Science 17(6), 891–911 (2011)
Lipmaa, H., Rogaway, P., Wagner, D.: Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption (2000), http://csrc.nist.gov/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, YL., Leu, FY., Liu, JC., Yang, JH. (2013). A Block Cipher Mode of Operation with Two Keys. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds) Information and Communication Technology. ICT-EurAsia 2013. Lecture Notes in Computer Science, vol 7804. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36818-9_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-36818-9_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36817-2
Online ISBN: 978-3-642-36818-9
eBook Packages: Computer ScienceComputer Science (R0)