DOI QR코드

DOI QR Code

블록 암호 연산 모드 RBF(Random Block Feedback)의 알려진/선택 평문 공격에 대한 안전성 비교 분석

Safety Comparison Analysis Against Known/Chosen Plaintext Attack of RBF (Random Block Feedback) Mode to Other Block Cipher Modes of Operation

  • 투고 : 2014.04.07
  • 심사 : 2014.04.23
  • 발행 : 2014.05.31

초록

데이타 보안과 무결성은 유무선 통신 환경에서 데이터 전송 시에 중요한 요소이다. 대량의 데이터는 전송 전에, 통상 암호 연산 모드를 이용한 블록 암호 알고리즘에 의하여 암호화된다. ECB, CBC 등의 기존 연산 모드 외에 블록 암호 연산 모드로 RBF 모드가 제안된 바 있다. 본 논문에서는, 알려진 평문 공격 (known plaintext attack) 및 선택 평문 공격 (chosen plaintext attack)에 대한, RBF 모드의 안전성을 기존 모드들과 비교 분석한 내용을 소개한다. 분석 결과, 기존의 연산 모드들이 알려진/선택 평문 공격에 취약한데 반하여, RBF 모드는 이들 공격에 안전함을 알 수 있었다.

Data security and integrity is a critical issue in data transmission over wired/wireless links. A large amount of data is encrypted before transmission, by block cipher using mode of operation. RBF mode is a block cipher mode of operation which uses random characteristics. In this paper, we analyze the safety against known plaintext attack and chosen plaintext attack of RBF mode compared to the traditional modes. According to the analysis, RBF mode is known to be secure while the traditional modes are not secure against them.

키워드

참고문헌

  1. Data Encryption Standard, FIPS (Federal Information Processing Standards Publication) 46-3, National Institute of Standard & Technology (NIST), 1999.
  2. Announcing the Advanced Encryption Standard (AES), FIPS (Federal Information Processing Standards Publication) 197, National Institute of Standard & Technology (NIST), 2001.
  3. Morris Dworkin (Editor), Recommendation for Block Cipher Modes of Operation - Methods and Techniques, Special Publication 800-38A, National Institute of Standard & Technology (NIST), 2001.
  4. P. J. Lee, "ISO/IEC JTC1/SC27 International Standard 8372 - Information Processing - Modes of operation for a 64-bit block cipher algorithm," J. Korea Inst. Inf. Security & Cryptology, vol. 4, no. 1, Mar. 1994.
  5. H. J. Kim and Y. J. Jeong, "Design of I/O module for pipelining crypto processors," in Proc. KICS, pp. 1926-1929, Korea, Jul. 2002.
  6. S. K. Yang, G. H. Kim, C. S. Park, and G. Y. Cho, "Study for block cipher operating Mode using counter," in Proc. KIICE, Daejoen, Korea, Oct. 2008.
  7. Y. Huang, F. Leu, J. Liu, J. Yang, C. Yu, C. Chu, and C. Yang, "Building a block cipher mode of operation with feedback keys," in Proc. IEEE ISIE, Taipei, Taiwan, May 2013.
  8. Y. Kim, An efficient mode of operation for block ciphers and a remote audit system using the mode, Ph.D Dissertation, Seoul National University, 2000.
  9. Y. Kim and Y. Cho, "The random block feedback mode for block ciphers," IEICE Trans. Fundamentals, vol. E00-A, no. 6, Jun. 2000.
  10. Y. Kim, J. Yoon, J.-H. Joo, and K. Yi, "Robust lightweight fingerprint encryption using random block feedback," IET Electronics Lett., vol 50, Issue 4, Feb. 2014.
  11. Y. Kim, J. Yoon, and K. Yi, "Random block feedback mode for AES: A more secure mode of operation with small overhead," submitted, 2014.
  12. D. Stinson, Cryptography: Theory and Practice, Florida: CRC Press, 2006.
  13. A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Crytography, Florida: CRC Press, 1996.
  14. E. Biham and P. C. Kocher, "A known plaintext attack on the PKZIP stream cipher," Fast Software Encryption, Lecture Notes in Comput. Sci., vol. 1008, pp. 144-153, 1995.
  15. J. Lu, O. Dunkelman, N. Keller, and J. Kim, "New impossible differential attacks on AES," INDOCRYPT 2008, LNCS, vol. 5365, pp. 279-293, 2008.