Counter-Offset mode: A new paradigm in resisting differential cryptanalysis
Main Article Content
Abstract
This study introduces the Counter-Offset mode, a novel advancement in block cipher encryption techniques designed to enhance the traditional Counter mode’s resistance to differential cryptanalysis. By integrating a unique input transformation mechanism, the Counter-Offset mode significantly improves upon the security features of the conventional Counter mode without compromising its efficiency and ability to process data blocks in parallel. Through a rigorous security analysis, we demonstrate that this innovative mode not only maintains the essential advantages of its predecessor—including parallelizability and low overhead—but also offers increased protection against cryptanalytic attacks. Our findings suggest that the Counter-Offset mode presents a compelling solution for applications requiring high security without the expense of reduced performance. This work lays the groundwork for future investigations into its application across various cryptographic systems, highlighting its potential to address emerging security challenges in the digital age.
Downloads
Article Details
Copyright (c) 2024 Nawaz MF, et al.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Licensing and protecting the author rights is the central aim and core of the publishing business. Peertechz dedicates itself in making it easier for people to share and build upon the work of others while maintaining consistency with the rules of copyright. Peertechz licensing terms are formulated to facilitate reuse of the manuscripts published in journals to take maximum advantage of Open Access publication and for the purpose of disseminating knowledge.
We support 'libre' open access, which defines Open Access in true terms as free of charge online access along with usage rights. The usage rights are granted through the use of specific Creative Commons license.
Peertechz accomplice with- [CC BY 4.0]
Explanation
'CC' stands for Creative Commons license. 'BY' symbolizes that users have provided attribution to the creator that the published manuscripts can be used or shared. This license allows for redistribution, commercial and non-commercial, as long as it is passed along unchanged and in whole, with credit to the author.
Please take in notification that Creative Commons user licenses are non-revocable. We recommend authors to check if their funding body requires a specific license.
With this license, the authors are allowed that after publishing with Peertechz, they can share their research by posting a free draft copy of their article to any repository or website.
'CC BY' license observance:
License Name |
Permission to read and download |
Permission to display in a repository |
Permission to translate |
Commercial uses of manuscript |
CC BY 4.0 |
Yes |
Yes |
Yes |
Yes |
The authors please note that Creative Commons license is focused on making creative works available for discovery and reuse. Creative Commons licenses provide an alternative to standard copyrights, allowing authors to specify ways that their works can be used without having to grant permission for each individual request. Others who want to reserve all of their rights under copyright law should not use CC licenses.
Rogaway P. Japan, Evaluation of some blockcipher modes of operation. 2011.
Katz J, Lindell Y. Introduction to modern cryptography. 2014. CRC press.
Dworkin M. Recommendation for block cipher modes of operation. Methods and techniques. National Inst of Standards and Technology Gaithersburg MD Computer security Div. 2001.
Mehmood A. Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. 2024; 12: 27530-27555.
Gava J. Assessment of Radiation-Induced Soft Errors on Lightweight Cryptography Algorithms Running on a Resource-constrained Device. 2023.
Karimov MM. Encryption Methods and Algorithms Based on Domestic Standards in Open-Source Operating Systems. 2023; 20: 42-49.
Usman H. Access Control and Privacy Preservation of Medical Records with Enhanced Rivest-Shamir-Adleman Algorithm Using Counter Mode Encryption. 2023.
Alkhyeli M. Secure Chat Room Application Using AES-GCM Encryption and SHA-256. In 2023 15th International Conference on Innovations in Information Technology (IIT). 2023. IEEE.
Thabit F. A comprehensive literature survey of cryptography algorithms for improving the iot security. 2023; 100759.
Dam DT. A survey of post-quantum cryptography: Start of a new race. 2023; 7(3): 40.
Salami Y. Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges. 2023; 16(2): 46-56.
Stallings W. Cryptography and Network Security, 4/E. Pearson Education India. 2006.
Dworkin M. Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality. National Institute of Standards and Technology. 2004.
Rogaway P, Bellare M, Black J. OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC), 2003; 6(3): 365-403.
Bellare M, Rogaway P, Wagner D. A conventional authenticated-encryption mode. Manuscript. 2003.
Iwata T, Kurosawa K. OMAC: One-Key CBC MAC—Addendum. 2003.
Kohno T, Viega J, Whiting D. The CWC authenticated encryption (associated data) mode. ePrint Archives. 2003.
Wegman MN, Carter JL. New hash functions and their use in authentication and set equality. Journal of computer and system sciences. 1981; 22(3): 265-279.
Goldwasser S, Micali S. Probabilistic encryption. 1984; 28(2): 270-299.
Bellare M. A concrete security treatment of symmetric encryption. In Proceedings 38th Annual Symposium on Foundations of Computer Science. 1997. IEEE.
Diffie W, Hellman ME. Privacy and authentication: An introduction to cryptography. 1979; 67(3): 397-427.
Lipmaa H, Wagner D, Rogaway P. Comments to NIST concerning AES modes of operation: CTR-mode encryption. 2000.
Rijmen V, Daemen J. National Institute of Standards, and Technology. Advanced encryption standard. 2001; 19-22.
McGrew DA. Counter mode security: Analysis and recommendations. Cisco Systems, Inc 2002; 2: 4.
Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. In Advances in Cryptology–CRYPTO. 1994.
Sung J. Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. In International Conference on Information Security and Cryptology. 2001.
Wallén J. Design principles of the KASUMI block cipher. In Proceedings of the Helsinki University of Technology Seminar on Network Security. 2000.
Xian L, Tingthanathikul W. Advanced Encryption Standard (AES) in Counter Mode. ECE.
Sibleyras F. Cryptanalysis of the Counter mode of operation. 2017.