Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 20
DOI: 10.1109/enabl.2000.883723
|View full text |Cite
|
Sign up to set email alerts
|

Initialization vector attacks on the IPsec protocol suite

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…McCubbin [2] analysed several IV attacks which are based on modifying the unauthenticated initialization vector (IV) of a CBC-encrypted packet during transmission. The attacker can change the first block of the decrypted plaintext by modifying the IV then use it to spoof the packet receiver.…”
Section: Introductionmentioning
confidence: 99%
“…McCubbin [2] analysed several IV attacks which are based on modifying the unauthenticated initialization vector (IV) of a CBC-encrypted packet during transmission. The attacker can change the first block of the decrypted plaintext by modifying the IV then use it to spoof the packet receiver.…”
Section: Introductionmentioning
confidence: 99%
“…As illustrated in [3,4,6,7,15,28], it is, today, common knowledge in the cryptographic community that encryption without authenticated integrity opens the door to various attacks. More recently, the authors of [22] illustrate this argument on the encryption-only configuration allowed by IPSec for the secure payload encapsulation (ESP) [11].…”
Section: Introductionmentioning
confidence: 99%
“…IPSec encryption-only configuration was shown to be exposed to variety of "initialization vector attacks" [15]. The authors of [15] analyze the security risks posed on encryption-only IPSec when it is used as intermediate layer of the protocol stack.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations