In this paper, we discuss using CTR mode, another standard encryption mode, to attack other standard encryption modes and using other standard encryption modes to attack CTR mode under the related-mode attack model. In particular, we point out that when the adversary has access to an oracle under one proper mode, then almost all other related-cipher modes, whether they are encryption modes or a...