Paper 2016/798
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Karthikeyan Bhargavan and Gaëtan Leurent
Abstract
While modern block ciphers, such as AES, have a block size of at least
128 bits, there are many 64-bit block ciphers, such as 3DES and
Blowfish, that are still widely supported in Internet security
protocols such as TLS, SSH, and IPsec. When used in CBC mode, these
ciphers are known to be susceptible to collision attacks when they are
used to encrypt around
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- Published elsewhere. ACM CCS 2016
- DOI
- 10.1145/2976749.2978423
- Keywords
- OpenVPNTLSHTTPSCBCcollision attack
- Contact author(s)
- gaetan leurent @ gmail com
- History
- 2018-12-08: revised
- 2016-08-24: received
- See all versions
- Short URL
- https://ia.cr/2016/798
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/798, author = {Karthikeyan Bhargavan and Gaëtan Leurent}, title = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on {HTTP} over {TLS} and {OpenVPN}}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/798}, year = {2016}, doi = {10.1145/2976749.2978423}, url = {https://eprint.iacr.org/2016/798} }