A Chosen Key Difference Attack on Control Vectors
نویسنده
چکیده
An attack on the implementation of control vectors in the IBM Common Cryptographic Architecture is presented. The final key−part holder in a multiple part import introduces two key−encrypting keys (KEKs), one the intended key and one with a chosen difference from the former, by including this difference in his own key part. When this difference is set to the difference between two control vectors, keys originally encrypted with the former KEK can be cast to a new type by importing them under the latter KEK. Thus unauthorised type−casts can be made from an arbitrary source type to any destination type the attacker has permission to use.
منابع مشابه
An efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملAn Improved Attack on WG Stream Cipher
WG is a synchronous stream cipher submitted to the hardware profile of eSTREAM project. The main feature of this stream cipher is the use of WG transformation. WG uses keys and initial vectors (IVs) of the same lengths 80, 96, 112 and 128 bits. Moreover, IVs of the length 32 and 64 bits are admitted. The most important key recovery attack on WG was presented by Wu and Preneel and uses the weakn...
متن کاملA Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers. In this paper we present several new related-key differential characteristics of MMB. These characteristics can be used to form several relatedkey boomerangs to attack the full MMB. Using 2 adaptive chos...
متن کاملDistinguisher for Shabal's Permutation Function
In this note we consider the Shabal permutation function P as a block cipher with input Ap,Bp and key C,M and describe a distinguisher with a data complexity of 2 random inputs with a given difference. If the attacker can control one chosen bit of Bp, only 2 21 inputs with a given difference are required on average. This distinguisher does not appear to lead directly to an attack on the full Sh...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کامل