Counter-Offset mode: A new paradigm in resisting differential cryptanalysis

Main Article Content

Muhammad Faisal Nawaz
Yasir Nawaz*

Abstract

This study introduces the Counter-Offset mode, a novel advancement in block cipher encryption techniques designed to enhance the traditional Counter mode’s resistance to differential cryptanalysis. By integrating a unique input transformation mechanism, the Counter-Offset mode significantly improves upon the security features of the conventional Counter mode without compromising its efficiency and ability to process data blocks in parallel. Through a rigorous security analysis, we demonstrate that this innovative mode not only maintains the essential advantages of its predecessor—including parallelizability and low overhead—but also offers increased protection against cryptanalytic attacks. Our findings suggest that the Counter-Offset mode presents a compelling solution for applications requiring high security without the expense of reduced performance. This work lays the groundwork for future investigations into its application across various cryptographic systems, highlighting its potential to address emerging security challenges in the digital age.

Downloads

Download data is not yet available.

Article Details

Nawaz, M. F., & Nawaz, Y. (2024). Counter-Offset mode: A new paradigm in resisting differential cryptanalysis. Trends in Computer Science and Information Technology, 9(1), 034–041. https://doi.org/10.17352/tcsit.000078
Review Articles

Copyright (c) 2024 Nawaz MF, et al.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Rogaway P. Japan, Evaluation of some blockcipher modes of operation. 2011.

Katz J, Lindell Y. Introduction to modern cryptography. 2014. CRC press.

Dworkin M. Recommendation for block cipher modes of operation. Methods and techniques. National Inst of Standards and Technology Gaithersburg MD Computer security Div. 2001.

Mehmood A. Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. 2024; 12: 27530-27555.

Gava J. Assessment of Radiation-Induced Soft Errors on Lightweight Cryptography Algorithms Running on a Resource-constrained Device. 2023.

Karimov MM. Encryption Methods and Algorithms Based on Domestic Standards in Open-Source Operating Systems. 2023; 20: 42-49.

Usman H. Access Control and Privacy Preservation of Medical Records with Enhanced Rivest-Shamir-Adleman Algorithm Using Counter Mode Encryption. 2023.

Alkhyeli M. Secure Chat Room Application Using AES-GCM Encryption and SHA-256. In 2023 15th International Conference on Innovations in Information Technology (IIT). 2023. IEEE.

Thabit F. A comprehensive literature survey of cryptography algorithms for improving the iot security. 2023; 100759.

Dam DT. A survey of post-quantum cryptography: Start of a new race. 2023; 7(3): 40.

Salami Y. Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges. 2023; 16(2): 46-56.

Stallings W. Cryptography and Network Security, 4/E. Pearson Education India. 2006.

Dworkin M. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality. National Institute of Standards and Technology. 2004.

Rogaway P, Bellare M, Black J. OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC), 2003; 6(3): 365-403.

Bellare M, Rogaway P, Wagner D. A conventional authenticated-encryption mode. Manuscript. 2003.

Iwata T, Kurosawa K. OMAC: One-Key CBC MAC—Addendum. 2003.

Kohno T, Viega J, Whiting D. The CWC authenticated encryption (associated data) mode. ePrint Archives. 2003.

Wegman MN, Carter JL. New hash functions and their use in authentication and set equality. Journal of computer and system sciences. 1981; 22(3): 265-279.

Goldwasser S, Micali S. Probabilistic encryption. 1984; 28(2): 270-299.

Bellare M. A concrete security treatment of symmetric encryption. In Proceedings 38th Annual Symposium on Foundations of Computer Science. 1997. IEEE.

Diffie W, Hellman ME. Privacy and authentication: An introduction to cryptography. 1979; 67(3): 397-427.

Lipmaa H, Wagner D, Rogaway P. Comments to NIST concerning AES modes of operation: CTR-mode encryption. 2000.

Rijmen V, Daemen J. National Institute of Standards, and Technology. Advanced encryption standard. 2001; 19-22.

McGrew DA. Counter mode security: Analysis and recommendations. Cisco Systems, Inc 2002; 2: 4.

Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. In Advances in Cryptology–CRYPTO. 1994.

Sung J. Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In International Conference on Information Security and Cryptology. 2001.

Wallén J. Design principles of the KASUMI block cipher. In Proceedings of the Helsinki University of Technology Seminar on Network Security. 2000.

Xian L, Tingthanathikul W. Advanced Encryption Standard (AES) in Counter Mode. ECE.

Sibleyras F. Cryptanalysis of the Counter mode of operation. 2017.

Most read articles by the same author(s)