2014 IEEE 27th Computer Security Foundations Symposium 2014
DOI: 10.1109/csf.2014.18
|View full text |Cite
|
Sign up to set email alerts
|

Automated Analysis and Synthesis of Block-Cipher Modes of Operation

Abstract: Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks. Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary length messages using any underlying block cipher. A mode of operation can be proven secure (say, against chosen-plaintext attacks) based on the assumption that the underlying block cipher is a pseudorandom function. Such proofs are complex and error-prone, however, and must be done from scratch whenever a new mode of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(25 citation statements)
references
References 14 publications
0
25
0
Order By: Relevance
“…We first provide an example from public key cryptography inspired by the work in [2] that consist on synthesizing padding schemes. Our second example is related to symmetric key encryption, and builds upon the work presented in [13].…”
Section: Cryptographic Constructionsmentioning
confidence: 99%
See 1 more Smart Citation
“…We first provide an example from public key cryptography inspired by the work in [2] that consist on synthesizing padding schemes. Our second example is related to symmetric key encryption, and builds upon the work presented in [13].…”
Section: Cryptographic Constructionsmentioning
confidence: 99%
“…Recent effort in the automation of the analysis of block cipher modes include [6,13]. In contrast to [6], which suffers from the limitation that the analyzed mode must operate on a fixed number of blocks, the work in [13] models the operation that is carried out when encrypting a single block, exploiting the common structure of block cipher modes of operation mentioned above.…”
Section: Synthesis Of Block Ciphers Modes Of Operationmentioning
confidence: 99%
“…Finally, we would like to stress that our work on synthesis of padding based encryption schemes has opened the door for the application of this technique in cryptography and has inspired a stream of work on different domains [11,81,12,96,65], providing evidence that machine-assisted design of cryptographic constructions can be realised by resorting to relatively simple ideas from program synthesis.…”
Section: Fully Automated Analysis and Synthesismentioning
confidence: 99%
“…Malozemoff et al [81] apply synthesis to construct block-cipher modes of operation satisfying confidentiality. Barthe et al [12] use a similar approach to synthesize structure preserving signatures building on an extension of the Generic Group Analyzer [11] to interactive assumptions.…”
Section: Synthesis Of Cryptographic Constructionsmentioning
confidence: 99%
See 1 more Smart Citation