New efficient padding methods secure against padding oracle attacks

Hyung Chul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the padding during decryption. Of the ten existing padding methods, only two (ABYT-PAD and ABIT-PAD) can withstand padding oracle attacks. However, these methods are not efficient since they either use a random number generator or require MAC verification in applications. The three new padding methods proposed in this paper are secure against padding oracle attacks and more efficient compared to the two aforementioned padding methods.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2015 - 18th International Conference, Revised Selected Papers
EditorsAaram Yun, Soonhak Kwon
PublisherSpringer Verlag
Pages329-342
Number of pages14
ISBN (Print)9783319308395
DOIs
StatePublished - 2016
Event18th International Conference on Information Security and Cryptology, ICISC 2015 - Seoul, Korea, Republic of
Duration: 25 Nov 201527 Nov 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9558
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on Information Security and Cryptology, ICISC 2015
Country/TerritoryKorea, Republic of
CitySeoul
Period25/11/1527/11/15

Keywords

  • CBC mode of operation
  • Padding methods
  • Padding oracle attack

Fingerprint

Dive into the research topics of 'New efficient padding methods secure against padding oracle attacks'. Together they form a unique fingerprint.

Cite this