You can't just say "we did this with 3 bytes, so you can do it with 4, or 5, or 20". No, that part of its strength, that's why the block size is what it is... You can't just hand wave that away
+Lan Party Hosting Hi, this is Al Carlson. Yes, ECB has been broken, but this attack applies to ALL of the modes that feature the same kind of feed forward/feed back mechanism. All that needs to be done is to adjust the subscripts correctly or to add the additional terms (such as in PCBC). One of the modes is for serial ciphers and there may be a susceptibility there, but we did not focus on that case. Of the 8 major modes, this will be effective on five of them.
Along the lines of that, where has the paper been published to? I tried looking for it, but can't find it. I'd like to read it. I was at the talk and loved it...what I was awake for, that is. Sleep disorders :(
+martijnvkk Sorry to take so long to reply, but the question is what is it you want to start? If it studying crypto, I suggest Schneier's book on the subject. That is always a good place to start. If you are asking about this particular break, start with reading Shannon's 1949 paper and then progressing to the works of Combettes on Set Theoretic Estimation.
You can't just say "we did this with 3 bytes, so you can do it with 4, or 5, or 20". No, that part of its strength, that's why the block size is what it is... You can't just hand wave that away
I don't get how he derives the plaintext from the xor relationships. What does the 50% rule have to do with it?
Do you suspect any other modes from having breaking vulnerabilities? I believe ECB has been proven to be broken quite some time.
+Lan Party Hosting Hi, this is Al Carlson. Yes, ECB has been broken, but this attack applies to ALL of the modes that feature the same kind of feed forward/feed back mechanism. All that needs to be done is to adjust the subscripts correctly or to add the additional terms (such as in PCBC). One of the modes is for serial ciphers and there may be a susceptibility there, but we did not focus on that case. Of the 8 major modes, this will be effective on five of them.
Along the lines of that, where has the paper been published to? I tried looking for it, but can't find it. I'd like to read it.
I was at the talk and loved it...what I was awake for, that is. Sleep disorders :(
Im new to programming, where do i start?
+martijnvkk Sorry to take so long to reply, but the question is what is it you want to start? If it studying crypto, I suggest Schneier's book on the subject. That is always a good place to start. If you are asking about this particular break, start with reading Shannon's 1949 paper and then progressing to the works of Combettes on Set Theoretic Estimation.
Thanks man :D