The security of ciphertext stealing

Phillip Rogaway*, Mark Wooding, Haibin Zhang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Citations (Scopus)

Abstract

We prove the security of CBC encryption with ciphertext stealing. Our results cover all versions of ciphertext stealing recently recommended by NIST. The complexity assumption is that the underlying blockcipher is a good PRP, and the security notion achieved is the strongest one commonly considered for chosen-plaintext attacks, indistinguishability from random bits (ind$-security). We go on to generalize these results to show that, when intermediate outputs are slightly delayed, one achieves ind$-security in the sense of an online encryption scheme, a notion we formalize that focuses on what is delivered across an online API, generalizing prior notions of blockwise-adaptive attacks. Finally, we pair our positive results with the observation that the version of ciphertext stealing described in Meyer and Matyas's well-known book (1982) is not secure.

Original languageEnglish
Title of host publicationFast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers
Pages180-195
Number of pages16
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event19th International Workshop on Fast Software Encryption, FSE 2012 - Washington, DC, United States
Duration: 19 Mar 201221 Mar 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7549 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference19th International Workshop on Fast Software Encryption, FSE 2012
Country/TerritoryUnited States
CityWashington, DC
Period19/03/1221/03/12

Keywords

  • CBC
  • blockwise-adaptive attacks
  • ciphertext stealing
  • cryptographic standards
  • modes of operation
  • provable security

Fingerprint

Dive into the research topics of 'The security of ciphertext stealing'. Together they form a unique fingerprint.

Cite this