2006
DOI: 10.1007/11915034_66
|View full text |Cite
|
Sign up to set email alerts
|

On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…PRP-RKA security of the resulting cipher comes with a restriction that the set of RKD functions Φ defining an RKA adversary only modifies the second part of the key (i.e., K 2 ). This is a weaker notion of RKA security compared to previous works [19,20,34] where no such restriction is made.…”
Section: Construction Amentioning
confidence: 87%
“…PRP-RKA security of the resulting cipher comes with a restriction that the set of RKD functions Φ defining an RKA adversary only modifies the second part of the key (i.e., K 2 ). This is a weaker notion of RKA security compared to previous works [19,20,34] where no such restriction is made.…”
Section: Construction Amentioning
confidence: 87%
“…PRP-RKA security of the resulting cipher comes with a restriction that the set of RKD functions Φ defining an RKA adversary only modifies the second part of the key (i.e., K 2 ). This is a weaker notion of RKA security compared to previous works [6,7,14] where no such restriction is made.…”
Section: First Constructionmentioning
confidence: 88%
“…However, as demonstrated in [21,36,38], these kinds of attacks can be mounted in some of the current real-world applications such as the IBM 4758 cryptoprocessor, PGV-type hash functions, message authentication codes, recent authenticated encryption modes, cases of key-exchange protocols that do not guarantee key integrity, and key-update protocols that updates session keys using a known function, for example, K, K + 1, K + 2, etc., where K is a session key.…”
Section: Related Work-existing Related-key Attacks On Block Ciphersmentioning
confidence: 98%