Security of XCB and HCTR

08/11/2023
by   Manish Kumar, et al.
0

Tweakable Enciphering Scheme (TES) is a length preserving scheme which provides confidentiality and admissible integrity. XCB (Extended Code Book) is a TES which was introduced in 2004. In 2007, it was modified and security bound was provided. Later, these two versions were referred to as XCBv1 and XCBv2 respectively. XCBv2 was proposed as the IEEE-std 1619.2 2010 for encryption of sector oriented storage media. In 2013, first time Security bound of XCBv1 was given and XCBv2's security bound was enhanced. A constant of 2^22 appears in the security bounds of the XCBv1 and XCBv2. We showed that this constant of 2^22 can be reduced to 2^5. Further, we modified the XCB (MXCB) scheme such that it gives better security bound compared to the present XCB scheme. We also analyzed some weak keys attack on XCB and a type of TES known as HCTR (proposed in 2005). We performed distinguishing attack and the hash key recovery attack on HCTR. Next, we analyzed the dependency of the two different keys in HCTR.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/06/2017

Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes

This letter presents a cryptanalysis of the modified McEliece cryptosyst...
research
12/19/2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

The modified Paillier cryptosystem has become extremely popular and appl...
research
10/19/2019

Breaking an image encryption scheme based on Arnold map and Lucas series

Fairly recently, a novel image encryption based on Arnold scrambling and...
research
06/09/2021

Recovering AES Keys with a Deep Cold Boot Attack

Cold boot attacks inspect the corrupted random access memory soon after ...
research
09/15/2019

A Vector Space Approach to Generate Dynamic Keys for Hill Cipher

In this paper a variant of the Hill cipher is proposed. In the classical...
research
09/24/2021

Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

Security is a key problem for the transmission, interchange and storage ...
research
10/30/2019

Secure Logging with Security against Adaptive Crash Attack

Logging systems are an essential component of security systems and their...

Please sign up or login with your details

Forgot password? Click here to reset