2020
DOI: 10.1007/s00145-020-09359-8
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
31
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(34 citation statements)
references
References 28 publications
2
31
1
Order By: Relevance
“…We also remark that the recent attacks on OCB2 by Inoue et al [IIMP19] is also not applicable against LOCUS. Basically, their attack exploits a flaw in the last block processing of OCB2.…”
Section: Some Remarks On Generic Cryptanalysis On Locus and Lotusmentioning
confidence: 79%
“…We also remark that the recent attacks on OCB2 by Inoue et al [IIMP19] is also not applicable against LOCUS. Basically, their attack exploits a flaw in the last block processing of OCB2.…”
Section: Some Remarks On Generic Cryptanalysis On Locus and Lotusmentioning
confidence: 79%
“…All these results clearly show the importance of cryptanalysis work against modes of operation, even when the attacks do not contradict the proofs. In addition, this type of work sometimes detects mistakes in the proofs, as shown with GCM [15] and OCB2 [14].…”
Section: Related Workmentioning
confidence: 99%
“…This also holds for AEAD designs, where it seems fair to say that the high level of integration that the most efficient blockcipher-based schemes feature also makes the schemes challenging to fully comprehend and surround on a formal level. A prime example of where the security argument of an intricate AEAD scheme turned out to be fatally flawed, and this went unnoticed for a rather long period of time, is given by the recent results on OCB2 that completely broke the scheme [IIMP19]. There are several similar cases to report on, including the flawed EAX' scheme [MLMI14], a flawed argument in the security proof of GCM [IOM12], and flaws in some of the CAESAR submissions [Nan14,BS16,SMAP16].…”
Section: Motivation For Aead Combinersmentioning
confidence: 99%
“…That is, encryption and integrity protection of the message are conducted independently of the associated data. Examples where this technique is used include EAX [BRW04] and the OCB family (OCB3 [KR11] and the insecure OCB2 [Rog04,IIMP19]).…”
Section: Ciphertext Translation Based Aeadmentioning
confidence: 99%